Search Results - (( user computing based algorithm ) OR ( based classifications based algorithm ))
Search alternatives:
- based classifications »
- classifications based »
- computing based »
- user computing »
-
1
Classification of credit card holder behavior using K Nearest Neighbor algorithm / Ahmad Faris Rahimi
Published 2017“…The second one is to develop prototype for classification of credit cardholder behavior based on k Nearest Neighbors Algorithm. …”
Get full text
Get full text
Thesis -
2
Automatic email classification system / Phang Siew Ting
Published 2003“…For this purpose, several Machine Learning algorithms has been purposed to automate the classification of emails. …”
Get full text
Get full text
Thesis -
3
A New Mobile Botnet Classification based on Permission and API Calls
Published 2024“…Currently, mobile botnet attacks have shifted from computers to smartphones due to its functionality, ease to exploit, and based on financial intention. …”
Proceedings Paper -
4
A new mobile botnet classification based on permission and API calls
Published 2024Conference Paper -
5
ABC: android botnet classification using feature selection and classification algorithms
Published 2017“…In this paper, a new approach for Android botnet classification based on features selection and classification algorithms is proposed. …”
Get full text
Get full text
Article -
6
Review of the machine learning methods in the classification of phishing attack
Published 2019“…The development of computer networks today has increased rapidly. This can be seen based on the trend of computer users around the world, whereby they need to connect their computer to the Internet. …”
Get full text
Get full text
Get full text
Article -
7
Enhance key generation algorithm based user string identity as public key
Published 2015“…This study aims to enhance a previous algorithm called the Tripathi algorithm. The Tripathi algorithm proposes an RSA based approach to generate cryptographic keys using a user’s identity, such as an E-mail address. …”
Get full text
Get full text
Thesis -
8
Image classification using two dimensional wavelet coefficients with parallel computing
Published 2020“…Future development can be carried out by creating a database based on the user’s standard of measure and accessing it whenever the user starts the program.…”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
9
Maldroid- attribute selection analysis for malware classification
Published 2019“…Hence, the objective of this paper is to find the most effective and efficient attribute selection and classification algorithm in malware detection. Moreover, in order to get the best combination between attribute selection and classification algorithm, eight attributes selection and seven categories machine learning algorithm are applied in this study. …”
Get full text
Get full text
Get full text
Article -
10
Jogging activity recognition using k-NN algorithm
Published 2022“…The k-NN algorithm is a simple and easy-to-implement supervised machine learning algorithm that can be used to solve both classification and regression problems. …”
Get full text
Get full text
Get full text
Academic Exercise -
11
A Machine Learning Classification Approach To Detect Tls-Based Malware Using Entropy-Based Flow Set Features
Published 2022“…This thesis proposes a TLS-based malware detection (TLSMalDetect) approach based on ML classification to address flow feature utilization limitations in related work. …”
Get full text
Get full text
Thesis -
12
Sentiment analysis of restaurant reviews in Kuala Terengganu based on K-Nearest Neighbor/ Siti Syazwana Jafri
Published 2021“…The chosen technique is classification and the algorithm that will be applied in the classification process is K- Nearest Neighbor (KNN). …”
Get full text
Get full text
Thesis -
13
Security alert framework using dynamic tweet-based features for phishing detection on twitter
Published 2019“…This model is then embedded into the detection algorithm together with the inclusion of dynamic tweet-based features which are not as part of the features used to train a classification model for phishing tweet detection. …”
Get full text
Get full text
Thesis -
14
Artificial immune system based on real valued negative selection algorithms for anomaly detection
Published 2015“…With respect to all the algorithms, V-Detector proved to be superior and surpassed all other algorithms based on performance and execution time.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
15
Emotion Detection Based on EEG Signal
Published 2021“…Today, it is vital for the computers to recognize the emotion of user that interacts with the computer in Human Computer Interaction (HCI) frameworks to make the devices more successful and comprehensive for everyone. …”
Get full text
Get full text
Final Year Project -
16
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…Studies have shown how user perception can have a strong influence on policies and decision-making processes in a place, society, and nation. This thesis is based on the application of sentiment classification algorithm to tweet data with the goal of classifying messages based on the polarity of sentiment towards a particular topic (or subject matter). …”
Get full text
Get full text
Get full text
Thesis -
17
-
18
A web-based implementation of k-means algorithms
Published 2022Get full text
Get full text
Final Year Project / Dissertation / Thesis -
19
-
20
VHDL modeling of EMG signal classification using artificial neural network
Published 2012“…Electromyography (EMG) signal based research is ongoing for the development of simple, robust, user friendly, efficient interfacing devices/systems. …”
Get full text
Get full text
Article
