Search Results - (( using (vectorisation OR victimization) based algorithm ) OR ( java application bee algorithm ))
Search alternatives:
- java application »
- application bee »
- bee algorithm »
-
1
An Automated System For Classifying Conference Papers
Published 2021“…The best classification model was then deployed to a web-based research conference system. The web-based system was developed using the Django web framework, based on a system architecture defined in this project called the Enhanced 3-Tier Web-based System with a Data Mining Layer. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
2
Adaptive emergency evacuation centre management for dynamic relocation of flood victims using firefly algorithm
Published 2016“…The proposed model operates using Firefly multi-objective optimization algorithm that creates an optimal schedule for the relocation of victims and resources for an evacuation centre. …”
Get full text
Get full text
Get full text
Article -
3
Cyber fraud profiling with routine activity theory using data mining techniques / Sunardi, Abdul Fadlil and Nur Makkie Perdana Kusuma
Published 2023“…It can also be used to profile victim demographics based on victim characteristics. …”
Get full text
Get full text
Article -
4
The application of firefly algorithm in an adaptive emergency evacuation centre management (AEECM) for dynamic relocation of flood victims
Published 2016“…This study undergoes two main phases; development of algorithm and models, and development of a web-based and mobile app.The proposed model operates using Firefly multi-objective optimization algorithm that creates an optimal schedule for the relocation of victims and resources for an evacuation centre.The proposed decision aid model and the adaptive system can be applied in supporting the National Security Council’s respond mechanisms for handling disaster management level II (State level) especially in providing better management of the flood evacuating centres.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
The swarm-based exploration algorithm with expanded circle pattern for searching activities
Published 2015“…In this paper, we propose an exploration algorithm using quadcopter in simulation to discover an unknown area that is based on the expanding circle pattern for searching activities. …”
Get full text
Get full text
Get full text
Article -
6
RENTAKA: A novel machine learning framework for crypto-ransomware pre-encryption detection
Published 2022“…Crypto ransomware is malware that locks its victim’s file for ransom using an encryption algorithm. …”
Get full text
Get full text
Get full text
Article -
7
Fingerprint verification using clonal selection algorithm / Farah Syadiyah Shamsudin
Published 2017“…There will be two processes involved, which are feature extraction using minutiae-based method and also the implementation of the proposed algorithm, CSA. …”
Get full text
Get full text
Thesis -
8
Development of a fall detection system based on neural network featuring IoT-Technology
Published 2021“…A body temperature and heartpulse monitoring device were developed for this system to provide the medical personnel additional information on the body condition of the fall victim. Using the latest IoT-technology, the system can be connected to the internet and provides a continuous and real-time monitoring capability. …”
Get full text
Get full text
Get full text
Article -
9
Workload performance evaluation of large spatial database for DSS based disaster management
Published 2017“…Additionally, the results of the study indicated that the prediction model for workload performance evaluation using CBR that is optimized with Hash Search technique for determining workload data on Shortest Path analysis via the employment of Dijkstra algorithm can be useful for the prediction of incoming workload based on the status of the DBMS parameters. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
10
SEDF: a spoofed email detection framework employed by a lightweight web browser plug-in for detecting the spoofed email / Al Ya@Geogiana Buja...[et al.]
Published 2014“…Therefore, this research will propose the SEDF to overcome the problem of email spoofing. The algorithm use to match the word in the searching period in the mail header is based on The Boyer-Moore. …”
Get full text
Get full text
Research Reports -
11
Digital Framing and Reputation Crisis: A TikTok Framing Analysis of the Yai Mim–Sahara Case in the Context of Communication
Published 2026journal-article -
12
Development of eCall for Malaysia's automotive industries
Published 2019“…As such, collision detection and voice communication algorithm has been designed. For the collision detection, algorithm has been developed based on the data acquired from gyroscope and accelerometer. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
13
Implementation And Performance Analysis Of Machine Learning Models For Detecting Phishing Attacks On Websites
Published 2023“…Usually, phishing websites are created resembling legitimate sources to deceive victims. To prevent users from falling victim to phishing websites, a machine-learning-based solution is proposed in this project. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
14
-
15
Sentiment Analysis of Sexual Harassment in Malaysia on Twitter Using Machine Learning Algorithms
Published 2023Get full text
Get full text
Final Year Project Report / IMRAD -
16
An Enhanced Mechanism To Detect Drdos Attacks On Dns Using Adaptive Thresholding Technique
Published 2023“…Thus, this thesis presents a mechanism for detecting DRDoS attacks on DNS that is strengthened by the use of modified metaheuristic algorithms and adaptive thresholding techniques based on machine learning algorithms (EMDDMAT).…”
Get full text
Get full text
Thesis -
17
-
18
Crytojacking Classification based on Machine Learning Algorithm
Published 2024journal::journal article -
19
-
20
A novel framework for identifying twitter spam data using machine learning algorithms
Published 2020“…The research results contribute significantly to the field of cyber-security by forming a real-time system using machine learning algorithms.…”
Get full text
Get full text
Get full text
Article
