Search Results - (( using machine connection algorithm ) OR ( java application using algorithm ))
Search alternatives:
- connection algorithm »
- java application »
- using algorithm »
- machine »
-
1
Development Of Machine Learning User Interface For Pump Diagnostics
Published 2022“…The result from the SVM algorithms will be used as database for the machine learning in Microsoft Azure. …”
Get full text
Get full text
Monograph -
2
Mathematical simulation for 3-dimensional temperature visualization on open source-based grid computing platform
Published 2009“…The development of this architecture is based on several programming language as it involves algorithm implementation on C, parallelization using Parallel Virtual Machine (PVM) and Java for web services development. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
3
Network monopoly / Tan Kean Yeap
Published 2002“…Moreover, because of the expanding memory anda processing power of these computers, users can put the machine to work on new kinds of applications and functions. …”
Get full text
Get full text
Thesis -
4
Development of open platform controller for step-NC compliant CNC system
Published 2020“…Moreover, UOCC system has been extended to online environment via Wi-Fi which utilizes Transmission Control Protocol (TCP) Socket in Java which used the PC as server to create socket thus establishing bind connection between UOCC RM mobile phone and the UOCC system, allowing users to remotely monitor the machining process on mobile platform. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
5
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
6
-
7
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
8
Behaviour Analysis Among Adolescents And Children For Cyberbullying Based On Twitter And Kaggle Dataset
Published 2023“…Therefore, cyberbullying detection using a Machine Learning approach is suggested. This study presents the comparison of three Machine Learning algorithms for the detection using cyberbullying activity on social media platforms specifically Twitter. …”
Get full text
Get full text
Undergraduates Project Papers -
9
Second Level Password Generator
Published 2010“…Cryptography is an art to convert a message into other forms by using some algorithms. It is used widely in many fields such as securing message before sending through email, sending confidential documents or letters through networks, doing business online and etc. …”
Get full text
Get full text
Conference or Workshop Item -
10
Phishing attack detection using machine learning method
Published 2019“…The Naïve Bayes algorithm, Decision Tree algorithm and Support Vector Machine algorithm has been used to prevent the spam attack, as well as the phishing attack. …”
Get full text
Get full text
Get full text
Undergraduates Project Papers -
11
Wireless water quality cloud monitoring system with self-healing algorithm
Published 2017“…Favoriot is a platform for IoT and machine-to-machine (M2M) development. For this project, Favoriot platform is used for real time data. …”
Get full text
Get full text
Conference or Workshop Item -
12
Ultra-short-term PV power forecasting based on a support vector machine with improved dragonfly algorithm
Published 2021“…The IDA is used to select the best support vector machine parameters. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
13
Detection of DDoS attacks in IoT networks using machine learning algorithms
Published 2025Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
14
Detection and classification of conflict flows in SDN using machine learning algorithms
Published 2021“…Using a range flows from 1000 to 100000 with an increment of 10000 flows per step in two network topologies namely, Fat Tree and Simple Tree Topologies, that were created using the Mininet simulator and connected to the Ryu controller, the performance of the proposed algorithms was evaluated for efficiency and effectiveness across a variety of evaluation metrics. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
15
Novice programmers’ emotion and competency assessments using machine learning on physiological data / Fatima Jannat
Published 2022“…Hyper-parameter tuning has been used in all the algorithms using k-fold cross validation to have the best accuracy and to avoid the over-fitting issue. …”
Get full text
Get full text
Get full text
Thesis -
16
Real-Time Video Processing Using Native Programming on Android Platform
Published 2012“…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
17
-
18
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
19
Ant colony optimization (ACO) algorithm for CNC route problem
Published 2012“…The holes on the PCB had been drilled by using Computer Numerical Controlled (CNC) machines. …”
Get full text
Get full text
Undergraduates Project Papers -
20
Anomaly detection in network traffic using machine learning
Published 2026“…In this paper, an anomaly detection method is proposed using machine learning (ML) techniques. The study objective is to analyze the effectiveness and reliability of implementing machine learning techniques in identifying anomalies in network traffic. …”
Get full text
Get full text
Get full text
Article
