Search Results - (( pattern detection bayes algorithm ) OR ( java application testing algorithm ))

Refine Results
  1. 1

    Evaluation of fall detection classification approaches by Kerdegari, Hamideh, Samsudin, Khairulmizam, Ramli, Abdul Rahman, Ghotoorlar, Saeid Mokaram

    Published 2012
    “…The algorithms are Multilayer Perceptron, Naive Bayes, Decision tree, Support Vector Machine, ZeroR and OneR. …”
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2
  3. 3

    An Improved Network Intrusion Detection Method Based On CNN-LSTM-SA by Bian, Hui

    Published 2025
    “…However, these algorithms often fall short in consistently detecting and classifying network intrusions, particularly when distinctions between classes are subtle or when facing evolving attack patterns. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
    Get full text
    Get full text
    Final Year Project
  5. 5
  6. 6
  7. 7

    Investigating optimal smartphone placement for identifying stairs movement using machine learning by Muhammad Ruhul Amin, Shourov, Husman, Muhammad Afif, Toha, Siti Fauziah, Jasni, Farahiyah

    Published 2023
    “…The data was trained against 6 machine learning algorithms namely Decision Tree, Logistic Regression, Naive Bayes, Random Forest, Neural Networks and KNN. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Suspicious activities detection for anti-money laundering using machine learning techniques by Lim, Aun Chir

    Published 2025
    “…XGBoost is selected as the core detection engine due to its superior performance among five supervised machine learning algorithms tested: Random Forest, Naïve Bayes, Support Vector Machine and Artificial Neural Network. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  9. 9

    Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application by Yana Aditia, Gerhana, Nur, Lukman, Arief Fatchul, Huda, Cecep Nurul, Alam, Undang, Syaripudin, Devi, Novitasari

    Published 2020
    “…Performance Testing is used to test the performance of algorithm implementations in applications. …”
    Get full text
    Get full text
    Journal
  10. 10

    iBUST: An intelligent behavioural trust model for securing industrial cyber-physical systems by Azad, Saiful, Mahmud, Mufti, Kamal Zuhairi, Zamli, Kaiser, M. Shamim, Jahan, Sobhana, Razzaque, Md Abdur

    Published 2024
    “…These threats can largely be tackled by employing a Trust Management Model (TMM) by exploiting the behavioural patterns of nodes to identify their trust class. In this context, ML-based models are best suited due to their ability to capture hidden patterns in data, learning and improving the pattern detection accuracy over time to counteract and tackle threats of a dynamic nature, which is absent in most of the conventional models. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Advancing machine learning for identifying cardiovascular disease via granular computing by Ku Muhammad Naim, Ku Khalif, Noryanti, Muhammad, Mohd Khairul Bazli, Mohd Aziz, Mohammad Isa, Irawan, Mohammad Iqbal, ., Muhammad Nanda, Setiawan

    Published 2024
    “…Machine learning algorithms such as Naïve Bayes, k-nearest neighbor, random forest, and gradient boosting are commonly used in constructing these models. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Machine Learning-Based Stress Level Detection from EEG Signals by Nirabi, Ali, Abd Rhman, Faridah, Habaebi, Mohamed Hadi, Sidek, Khairul Azami, Yusoff, Siti Hajar

    Published 2021
    “…Stress is associated with the brain activities of human beings that can be scanned by electroencephalogram (EEG) signals which is very complex and often challenging to understand the signal's pattern. This paper presented a system to detect the stress level from the EEG signals using machine learning algorithms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  13. 13
  14. 14

    Implementation of (AES) Advanced Encryption Standard algorithm in communication application by Moh, Heng Huong

    Published 2014
    “…The concept of ABS algorithm was firstly studied, including the definition, historical background, and a brief comparison was made between the ABS algorithm with other types of algorithm. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  15. 15

    An integrated anomaly intrusion detection scheme using statistical, hybridized classifiers and signature approach by Mohamed Yassin, Warusia

    Published 2015
    “…Therefore, Statisticalbased Packet Header Anomaly Detection (SPHAD) and a hybridized Naive Bayes and Random Forest classifier (NB+RF) are considered for the ADS, and Signature-based Packet Header Intrusion Detection (SPHID) is proposed as the SDS. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Classification System for Heart Disease Using Bayesian Classifier by Magendram, Anusha

    Published 2007
    “…This system was developing base on to three main part which is data processing, testing and implementation of the algorithm. In this system a Bayesian algorithm was used in order to implement the system. …”
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18
  19. 19

    Encrypted mobile messaging application using AES block cipher cryptography algorithm / Nur Rasyiqah Zulkifli by Zulkifli, Nur Rasyiqah

    Published 2019
    “…The programming language that is used to write the program is Java Language that will run on android phones. As the result, this project was tested on the functionality of the mobile messaging application. …”
    Get full text
    Get full text
    Student Project
  20. 20