Search Results - (( set detection learning algorithm ) OR ( java implementation based algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…Today, with online marketing, banking, healthcare and other services, even the average householder is aware of encryption. The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Automatic Number Plate Recognition on android platform: With some Java code excerpts by ., Abdul Mutholib, Gunawan, Teddy Surya, Kartiwi, Mira

    Published 2016
    “…The main challenges of implementing ANPR algorithm on mobile phone are how to produce a higher coding efficiency, lower computational complexity, and higher scalability. …”
    Get full text
    Get full text
    Get full text
    Book
  4. 4

    Performance evaluation for different intrusion detection system algorithms using machine learning by Zarir, Mustafa Nadhim

    Published 2018
    “…The objectives of this project is to evaluate the performance of various intrusion detection algorithms based on machine learning. The algorithms considered are the Naive Bays Algorithm, Decision Tree Algorithm and Hybrid Algorithm for different datasets. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework by Asaad Aref, Ibrahim

    Published 2004
    “…A design proposal was outlined to provide an adaptive client/server approach to stream audio contents using Real-Time Transport Protocol (RTP) involving architecture based on the Java Media Framework (JMF) Application Programmable Interfaces (API).RTP protocol is the Internet-standard protocol for the transport of real-time data, including audio and video and can be implemented by using Java Media Framework (JMF). …”
    Get full text
    Get full text
    Thesis
  6. 6

    An algorithm for Elliott Waves pattern detection by Vantuch, T., Zelinka, I., Vasant, P.

    Published 2018
    “…Under several different algorithm settings, several EW pattern sets are obtained. …”
    Get full text
    Get full text
    Article
  7. 7

    An algorithm for Elliott Waves pattern detection by Vantuch, T., Zelinka, I., Vasant, P.

    Published 2018
    “…Under several different algorithm settings, several EW pattern sets are obtained. …”
    Get full text
    Get full text
    Article
  8. 8

    Improved hybrid teaching learning based optimization-jaya and support vector machine for intrusion detection systems by Mohammad Khamees Khaleel, Alsajri

    Published 2022
    “…Most of the currently existing intrusion detection systems (IDS) use machine learning algorithms to detect network intrusion. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Café Web Based System Using Priority Scheduling Approach by Fatimah, Ghazali, Rohana, Ismail, Mohamad Hariz, Hasni

    Published 2017
    “…The priority scheduling algorithm is based on Control Processing Unit scheduling algorithm where it has a priority to execute tasks. …”
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    Vehicle Detection in Deep Learning by Teoh, Per Nian

    Published 2019
    “…The objective of this project is vehicle detection with deep learning, so, vehicles data set from highway, urban road and housing area had been collected and applied to the deep learning and computer vision algorithms. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  11. 11

    Context-driven satire detection with deep learning by Razali, Md Saifullah, Abdul Halin, Alfian, Chow, Yang-Wai, Mohd Norowi, Noris, Doraisamy, Shyamala

    Published 2022
    “…This shows that each of the feature sets are significant. Finally, the combined feature sets undergoes the classification using well-known machine learning classification algorithms. …”
    Get full text
    Get full text
    Article
  12. 12

    Deep learning metaphor detection with emotion-cognition association by Razali, Md Saifullah, Abdul Halin, Alfian, Chow, Yang-Wai, Mohd Norowi, Noris, Doraisamy, Shyamala

    Published 2022
    “…These well-known ma-chine learning classification algorithms are used at the same time for the purpose of comparison. …”
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    Automated intruder detection from image sequences using minimum volume sets by Ahmed, Tarem, Wei, Xianglin, Ahmed, Supriyo, Pathan, Al-Sakib Khan

    Published 2012
    “…We propose a new algorithm based on machine learning techniques for automatic intruder detection in visual surveillance networks. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14
  15. 15

    Pairwise testing tools based on hill climbing algorithm (PTCA) by Lim, Seng Kee

    Published 2014
    “…The actual implementation of the algorithm which is in Java programming language, the program is implemented on Net Bean 7.0.1. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  16. 16

    Bat Algorithm for Complex Event Pattern Detection in Sentiment Analysis by Kabir Ahmad, Farzana, Kamaruddin, Siti Sakira, Yusof, Yuhanis, Yusoff, Nooraini

    Published 2021
    “…Thus, this study proposed a Bat Algorithm (BA) to address the complex learning structure of DBN in detecting sentiment patterns. …”
    Get full text
    Get full text
    Monograph
  17. 17

    Java based expert system for selection of natural fibre composite materials by Ahmed Ali, Basheer A., Salit, Mohd Sapuan, Zainudin, Edi Syams, Othman, Mohamed

    Published 2013
    “…In this paper, we develop a technology for the materials selection system using Java based expert system. The weighted-range method (WRM) was implemented to identify the range value and to scrutinise the candidate materials. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    A Machine Learning Classification Approach To Detect Tls-Based Malware Using Entropy-Based Flow Set Features by Keshkeh, Kinan

    Published 2022
    “…The difficulty and impracticality of decrypting TLS network traffic before it reaches the Intrusion Detection System (IDS) has driven numerous research studies to focus on anomaly-based malware detection without decryption employing various features and Machine Learning (ML) algorithms. …”
    Get full text
    Get full text
    Thesis
  19. 19

    DEVELOPMENT OF DRIVER DROWSINESS DETECTION ALGORITHM by YVONNE, PHUA YEE WUN

    Published 2022
    “…The modified LeNet-5 achieved the highest accuracy of 92.22% among the four proposed algorithms. It sets a great benchmark for future work on driver drowsiness detection. …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  20. 20