Search Results - (( learning program end algorithm ) OR ( java application customization algorithm ))
Search alternatives:
- customization algorithm »
- learning program »
- java application »
- end algorithm »
- program end »
-
1
A new mobile botnet classification based on permission and API calls
Published 2024Subjects:Conference Paper -
2
-
3
A New Mobile Botnet Classification based on Permission and API Calls
Published 2024“…As a result, 16 permissions and 31 API calls that are most related with mobile botnet have been extracted using feature selection and later classified and tested using machine learning algorithms. The experimental result shows that the Random Forest Algorithm has achieved the highest detection accuracy of 99.4% with the lowest false positive rate of 16.1% as compared to other machine learning algorithms. …”
Proceedings Paper -
4
Sentiment mining in twitter for early depression detection / Najihah Salsabila Ishak
Published 2021“…A comparison between built-in Scikit Learn Naive Bayes algorithm, and the scratch Naive Bayes algorithm is used to measure its effectiveness in terms of accuracy. …”
Get full text
Get full text
Thesis -
5
Implementation of hashed cryptography algorithm based on cryptography message syntax
Published 2019“…The system will automatically protect data and thus retrieve data at the end of the system. The important study in this research is an automated learning system for deep learning to enhance security. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
6
Optimal water supply reservoir operation by leveraging the meta-heuristic Harris Hawks algorithms and opposite based learning technique
Published 2024“…To ease water scarcity, dynamic programming, stochastic dynamic programming, and heuristic algorithms have been applied to solve problem matters related to water resources. …”
Article -
7
-
8
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
Get full text
Get full text
Thesis -
9
-
10
Lightning fault classification for transmission line using support vector machine
Published 2023“…In this study, two machine learning algorithms, Support Vector Machine (SVM) and k-Nearest Neighbor (kNN), were used and compared to classify faults due to lightning strikes, insulator failure, tree and crane encroachment. …”
Get full text
Get full text
Conference or Workshop Item -
11
Lightning Fault Classification for Transmission Line Using Support Vector Machine
Published 2024“…In this study, two machine learning algorithms, Support Vector Machine (SVM) and k-Nearest Neighbor (kNN), were used and compared to classify faults due to lightning strikes, insulator failure, tree and crane encroachment. …”
Conference Paper -
12
Designing machine learning frameworks for intelligence and gamification research / Nordin Abu Bakar
Published 2016“…The end product of learning that could establish the relationships between knowledge and intelligence. …”
Get full text
Get full text
Thesis -
13
-
14
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
15
Enhancing predictive crime mapping model using association rule mining for geographical and demographic structure
Published 2014“…Apriori is a popular algorithm in finding frequent set of items in data and association rule. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
16
-
17
-
18
Beyond Grades - Predicting Programme Learning Outcomes with Multi-Output Regression in Malaysian Higher Education
Published 2025journal-article -
19
Dynamic and adaptive execution models for data stream mining applications in mobile edge cloud computing systems / Muhammad Habib Ur Rehman
Published 2016“…The critical factors of complexity at application level include data size and data rate of continuously streaming data, the selection of data fusion and data preprocessing methods, the choice of learning models, learning rates and learning modes, and the adoption of data mining algorithms. …”
Get full text
Get full text
Get full text
Thesis
