Search Results - (( using internet learning algorithm ) OR ( java application optimisation algorithm ))

Refine Results
  1. 1

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…The system is essentially a three-part development, utilising Android, Java Servlets, and Arduino platforms to create an optimised and automated urban-gardening system. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    An efficient attack detection for Intrusion Detection System (IDS) in internet of medical things smart environment with deep learning algorithm by Abdulkareem, Fatimah Saleem, Mohd Sani, Nor Fazlida

    Published 2023
    “…Additionally, the results of the deep learning algorithms will be evaluated using five confusion matrices, namely, accuracy, precision, recall, F1Score, and false-positive rate). …”
    Get full text
    Get full text
    Article
  3. 3

    Development of web based learning content of animation algorithm on searching and sorting techniques / Nur Linda Abdi Nur by Abdi Nur, Nur Linda

    Published 2007
    “…The objectives of this project is to develop self-learning environment in learning searching and sorting algorithm, enhance understanding of student in learning searching and sorting technique and to apply web-based learning in computer science subject, which focus on courses that use searching and sorting algorithm.…”
    Get full text
    Get full text
    Thesis
  4. 4

    Intrusion detection system for the internet of things based on blockchain and multi-agent systems by Liang, Chao, Shanmugam, Bharanidharan, Azam, Sami, Karim, Asif, Islam, Ashraful, Zamani, Mazdak, Kavianpour, Sanaz, Idris, Norbik Bashah

    Published 2020
    “…This research focusses on the design, implementation and testing of an intrusion detection system which uses a hybrid placement strategy based on a multi-agent system, blockchain and deep learning algorithms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Internet of Things (IoT) based activity recognition strategies in smart homes: a review by Babangida, Lawal, Perumal, Thinagaran, Mustapha, Norwati, Yaakob, Razali

    Published 2022
    “…The obtained data can be subjected to extensive preprocessing and feature extraction tasks before being learned using appropriate machine learning or deep learning algorithms to generate a model capable of managing human activities more effectively. …”
    Get full text
    Get full text
    Article
  6. 6

    Phishing attack detection using machine learning method by Jupin, John Arthur

    Published 2019
    “…The Naïve Bayes algorithm, Decision Tree algorithm and Support Vector Machine algorithm has been used to prevent the spam attack, as well as the phishing attack. …”
    Get full text
    Get full text
    Get full text
    Undergraduates Project Papers
  7. 7
  8. 8

    Architecture for latency reduction in healthcare internet-of-things using reinforcement learning and fuzzy based fog computing by Shukla, S., Hassan, M.F., Jung, L.T., Awang, A.

    Published 2019
    “…This hybrid approach integrates healthcare IoT devices with the cloud and uses fog services with Fuzzy Reinforcement Learning Data Packet Allocation (FRLDPA) algorithm. …”
    Get full text
    Get full text
    Article
  9. 9

    Architecture for latency reduction in healthcare internet-of-things using reinforcement learning and fuzzy based fog computing by Shukla, S., Hassan, M.F., Jung, L.T., Awang, A.

    Published 2019
    “…This hybrid approach integrates healthcare IoT devices with the cloud and uses fog services with Fuzzy Reinforcement Learning Data Packet Allocation (FRLDPA) algorithm. …”
    Get full text
    Get full text
    Article
  10. 10
  11. 11

    Performances of machine learning algorithms for binary classification of network anomaly detection system by Nawir, M., Amir, A., Lynn, O.B., Yaakob, N., Ahmad, R.B.

    Published 2018
    “…The aim of this paper to build a network anomaly detection system using machine learning algorithms that are efficient, effective and fast processing. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12

    Web-based expert system for material selection of natural fiber- reinforced polymer composites by Ahmed Ali, Basheer Ahmed

    Published 2015
    “…Finally, the developed expert system was deployed over the internet with central interactive interface from the server as a web-based application. As Java is platform independent and easy to be deployed in web based application and accessible through the World Wide Web (www), this expert system can be one stop application for materials selection.…”
    Get full text
    Get full text
    Thesis
  13. 13

    Machine learning classification model for identifying internet addiction among university students by Tan, Hui Theng, Mun, Hou Kit, Handayani, Dini Oktarina Dwi

    Published 2023
    “…In this era of globalization, Internet addiction is a concerning issue, especially among university students as they are required to use the internet for academic purposes. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  14. 14

    Slangs And Short Forms Of Malay Twitter Sentiment Analysis Using Supervised Machine Learning by Cheng, Jet Yin, Ayop, Zakiah, Anawar, Syarulnaziah, Othman, Nur Fadzilah, Mohd Zainudin, Norulzahrah

    Published 2021
    “…This paper is to determine which of the algorithms chosen in supervised machine learning with higher accuracy in detecting internet slang and short forms. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Hyperparameter tuned deep learning enabled intrusion detection on internet of everything environment by Ahmed Hamza, Manar, Hassan Abdalla Hashim, Aisha, G. Mohamed, Heba, S. Alotaibi, Saud, Mahgoub, Hany, S. Mehanna, Amal, Motwakel, Abdelwahed

    Published 2022
    “…At first, data pre-processing is performed to convert the actual data into useful format. In addition, Chaotic Local Search Whale Optimization Algorithm-based Feature Selection (CLSWOA-FS) technique is employed to choose the optimal feature subsets. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Predicting Mental Health Disorder On Twitter Using Machine Learning Techniques by Lim, Shi Ru

    Published 2022
    “…Therefore, it is possible to analyze human behaviour using internet media. However, the illness of mental disorder is common yet often ignored. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  17. 17

    Investigation of An Early Prediction System of Cardiac Arrest Using Machine Learning Techniques by Muhammad Afnan, Mohammad Nasir

    Published 2022
    “…Random Forest algorithm be used in this study which is got the best performance with 83% accuracy then the other algorithms in WEKA. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  18. 18
  19. 19
  20. 20

    Overview of textual anti-spam filtering techniques by Subramaniam, T., Jalab, H.A., Taqa, A.Y.

    Published 2010
    “…This paper summarizes most common techniques used for anti-spam filtering by analyzing the e-mail content and also looks into machine learning algorithms such as Naive Bayesian, support vector machine and neural network that have been adopted to detect and control spam. …”
    Get full text
    Article