Search Results - (( pattern detection bayes algorithm ) OR ( java application testing algorithm ))
Search alternatives:
- application testing »
- pattern detection »
- testing algorithm »
- java application »
- detection bayes »
- bayes algorithm »
-
1
Evaluation of fall detection classification approaches
Published 2012“…The algorithms are Multilayer Perceptron, Naive Bayes, Decision tree, Support Vector Machine, ZeroR and OneR. …”
Get full text
Get full text
Conference or Workshop Item -
2
Android Mobile Malware Classification Based on System Call and Permission Using Tokenization
Published 2024thesis::master thesis -
3
An Improved Network Intrusion Detection Method Based On CNN-LSTM-SA
Published 2025“…However, these algorithms often fall short in consistently detecting and classifying network intrusions, particularly when distinctions between classes are subtle or when facing evolving attack patterns. …”
Get full text
Get full text
Get full text
Thesis -
4
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
5
-
6
-
7
Investigating optimal smartphone placement for identifying stairs movement using machine learning
Published 2023“…The data was trained against 6 machine learning algorithms namely Decision Tree, Logistic Regression, Naive Bayes, Random Forest, Neural Networks and KNN. …”
Get full text
Get full text
Get full text
Get full text
Article -
8
Suspicious activities detection for anti-money laundering using machine learning techniques
Published 2025“…XGBoost is selected as the core detection engine due to its superior performance among five supervised machine learning algorithms tested: Random Forest, Naïve Bayes, Support Vector Machine and Artificial Neural Network. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
9
Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application
Published 2020“…Performance Testing is used to test the performance of algorithm implementations in applications. …”
Get full text
Get full text
Journal -
10
iBUST: An intelligent behavioural trust model for securing industrial cyber-physical systems
Published 2024“…These threats can largely be tackled by employing a Trust Management Model (TMM) by exploiting the behavioural patterns of nodes to identify their trust class. In this context, ML-based models are best suited due to their ability to capture hidden patterns in data, learning and improving the pattern detection accuracy over time to counteract and tackle threats of a dynamic nature, which is absent in most of the conventional models. …”
Get full text
Get full text
Get full text
Article -
11
Advancing machine learning for identifying cardiovascular disease via granular computing
Published 2024“…Machine learning algorithms such as Naïve Bayes, k-nearest neighbor, random forest, and gradient boosting are commonly used in constructing these models. …”
Get full text
Get full text
Get full text
Article -
12
Machine Learning-Based Stress Level Detection from EEG Signals
Published 2021“…Stress is associated with the brain activities of human beings that can be scanned by electroencephalogram (EEG) signals which is very complex and often challenging to understand the signal's pattern. This paper presented a system to detect the stress level from the EEG signals using machine learning algorithms. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
13
-
14
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…The concept of ABS algorithm was firstly studied, including the definition, historical background, and a brief comparison was made between the ABS algorithm with other types of algorithm. …”
Get full text
Get full text
Undergraduates Project Papers -
15
An integrated anomaly intrusion detection scheme using statistical, hybridized classifiers and signature approach
Published 2015“…Therefore, Statisticalbased Packet Header Anomaly Detection (SPHAD) and a hybridized Naive Bayes and Random Forest classifier (NB+RF) are considered for the ADS, and Signature-based Packet Header Intrusion Detection (SPHID) is proposed as the SDS. …”
Get full text
Get full text
Thesis -
16
Classification System for Heart Disease Using Bayesian Classifier
Published 2007“…This system was developing base on to three main part which is data processing, testing and implementation of the algorithm. In this system a Bayesian algorithm was used in order to implement the system. …”
Get full text
Get full text
Thesis -
17
-
18
-
19
Encrypted mobile messaging application using AES block cipher cryptography algorithm / Nur Rasyiqah Zulkifli
Published 2019“…The programming language that is used to write the program is Java Language that will run on android phones. As the result, this project was tested on the functionality of the mobile messaging application. …”
Get full text
Get full text
Student Project -
20
Design Of Robot Motion Planning Algorithm For Wall Following Robot
Published 2006Get full text
Get full text
Monograph
