Search Results - (( user classification using algorithm ) OR ( java implementation model algorithm ))
Search alternatives:
- classification using »
- implementation model »
- user classification »
- java implementation »
- using algorithm »
- model algorithm »
-
1
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…RSA is one of these encryption algorithms that have been implemented in security systems. …”
Get full text
Get full text
Thesis -
2
Provider independent cryptographic tools
Published 2003“…The library is implemented by using Java cryptographic service provider framework that conforms to Java Cryptographic Architecture (JCA) and Java Cryptographic Extension (JCE). …”
Get full text
Get full text
Get full text
Monograph -
3
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
4
Jogging activity recognition using k-NN algorithm
Published 2022“…Jogging activity recognition using the k-NN algorithm is a system that can help users collect information data of user speed movement using speed sensor and give the classification of jogging activity to the user. …”
Get full text
Get full text
Get full text
Academic Exercise -
5
Classification of Google Play application using decision tree algorithm on sentiment analysis of text reviews / Aqil Khairy Hamsani, Ummu Fatihah Mohd Bahrin and Wan Dorishah Wan A...
Published 2023“…To achieve these objectives, the methods employed involve data preprocessing and implementing the Decision Tree (DT) algorithm for classification. The classification model is trained and tested using various split ratios, and the optimal depth for the DT is determined through parameter tuning to achieve the best accuracy. …”
Get full text
Get full text
Article -
6
Classification of credit card holder behavior using K Nearest Neighbor algorithm / Ahmad Faris Rahimi
Published 2017“…This indicates that the performance of KNN is acceptable and promising in this classification problem. Since KNN is the simplest form of artificial intelligence, future work could combine this algorithm with other classification algorithm. …”
Get full text
Get full text
Thesis -
7
Optimization of blood vessel detection in retina images using multithreading and native code for portable devices
Published 2013“…The performance of Java programming model and native programming model are compared with respect to the execution time for blood vessel detection. …”
Get full text
Get full text
Conference or Workshop Item -
8
An adaptive ant colony optimization algorithm for rule-based classification
Published 2020“…Differing from other complex and difficult classification models, rules-based classification algorithms produce models which are understandable for users. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
9
ABC: android botnet classification using feature selection and classification algorithms
Published 2017“…The Information Gain algorithm is used to select the most significant permissions, then the classification algorithms Naïve Bayes, Random Forest and J48 used to classify the Android apps as botnet or benign apps. …”
Get full text
Get full text
Article -
10
Development of interactive application for classification of Artocarpus Species
Published 2020“…The combination of Prewitt algorithm, Canny alogorithm, Gray-Level co-occurrence matrix will be used in SVM. …”
Get full text
Undergraduate Final Project Report -
11
Image classification using two dimensional wavelet coefficients with parallel computing
Published 2020“…In addition, this research does not require any pre-stored database to train the algorithm. This research requires the supervision from the users to train the algorithm by naming the region. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
12
A new mobile botnet classification based on permission and API calls
Published 2024Conference Paper -
13
A Toolkit for Simulation of Desktop Grid Environment
Published 2014“…A simulator for desktop grid environment has been developed using Java as the implementation language due to its wide popularity. …”
Get full text
Get full text
Final Year Project -
14
ChoCD : Usable and secure graphical password authentication scheme
Published 2024thesis::master thesis -
15
A New Mobile Botnet Classification based on Permission and API Calls
Published 2024“…This classification is developed using static analysis in a controlled lab environment and the Drebin dataset is used as the training dataset. 800 apps from the Google Play Store have been chosen randomly to test the proposed classification. …”
Proceedings Paper -
16
Text Extraction Algorithm for Web Text Classification
Published 2010“…This study provides a text extraction algorithm for web text classification. The extraction algorithm consists of three phases namely web page extraction, rule formulation, and algorithm validation. …”
Get full text
Get full text
Get full text
Thesis -
17
-
18
A Model for Evaluation of Cryptography Algorithm on UUM Portal
Published 2004“…The methodology used in this study begun with problem identification, requirement identification, analysed the model process and design the simulation model. The simulation model was developed using Active Server Page, JavaScript and SQL 7.0 as database. …”
Get full text
Get full text
Get full text
Thesis -
19
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
20
Maldroid- attribute selection analysis for malware classification
Published 2019“…Hence, the objective of this paper is to find the most effective and efficient attribute selection and classification algorithm in malware detection. Moreover, in order to get the best combination between attribute selection and classification algorithm, eight attributes selection and seven categories machine learning algorithm are applied in this study. …”
Get full text
Get full text
Get full text
Article
