Search Results - (( attack prediction model algorithm ) OR ( java application interface algorithm ))

Refine Results
  1. 1

    Predicting attackers of online shaming using ant colony optimization / Noor Shafiqa Fazlien Mohamad Fauzi by Mohamad Fauzi, Noor Shafiqa Fazlien

    Published 2020
    “…In order to predict the attackers of online shaming, Ant Colony Optimization Algorithm will be used and it will be compared with J48 algorithm. …”
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3

    Predicting the success of suicide terrorist attacks using different machine learning algorithms by Hossain, Md Junayed, Abdullah, Sheikh Md, Barkatullah, Mohammad, Miahh, Md Saef Ulla, Sarwar, Talha, Monir, Md Fahad

    Published 2022
    “…The main objective of our paper is to predict different types of attacks, such as successful suicide attacks, successful non-suicide attacks, unsuccessful suicide attacks, and unsuccessful non-suicide attacks. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    Intrusion Detection in Mobile Ad Hoc Networks Using Transductive Machine Learning Techniques by Farhan, Farhan Abdel-Fattah Ahmad

    Published 2011
    “…The transductive conformal prediction and outlier detection have been employed for feature selection algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    Real-time algorithmic music composition application. by Yap, Alisa Yi Hui

    Published 2022
    “…In addition, the system also utilises JavaFx and jFugue for its graphical user interface and music programming respectively. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  6. 6

    A new machine learning-based hybrid intrusion detection system and intelligent routing algorithm for MPLS network by Mohammad Azmi Ridwan, Dr.

    Published 2023
    “…The datasets are then fed into MATLAB to train ML classifiers and regression models to classify the incoming traffic as normal or attack and predict traffic delays for all available routes, respectively. …”
    text::Thesis
  7. 7

    Application-Programming Interface (API) for Song Recognition Systems by Murtadha Arif Sahbudin, Chakib Chaouch, Salvatore Serrano

    Published 2024
    “…In addition the implementation is done by algorithm using Java’s programming language, executed through an application developed in the Android operating system. …”
    Article
  8. 8

    Stress mental health symptom assessment mobile application for young adults by Lee, Chun Hoong

    Published 2023
    “…Subsequently, employing the K-Nearest Neighbors (KNN) algorithm, the model shall forecast the likelihood of experiencing a future panic attack. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  9. 9

    Jaya algorithm hybridized with extreme gradient boosting to predict the corrosion-induced mass loss of agro-waste based monolithic and Ni-reinforced porous alumina by Dele-Afolabi T.T., Jung D.W., Ahmadipour M., Azmah Hanim M.A., Adeleke A.O., Kandasamy M., Gunnasegaran P.

    Published 2025
    “…In this work, the non-linear predictive power of a hybridized machine learning prediction model, specifically Jaya-XGBoost to predict the corrosion-induced mass loss of monolithic and nickel-reinforced porous alumina ceramics has been examined. …”
    Article
  10. 10

    Visdom: Smart guide robot for visually impaired people by Lee, Zhen Ting

    Published 2025
    “…The system architecture integrates ROS 2 on a Raspberry Pi, with TCP/IP connectivity enabling remote operation. An Android mobile application, developed using Java and the java.net.Socket library, provides an intuitive and accessible user interface for seamless interaction with the robot. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  11. 11

    An enhanced adaptive grey verhulst prediction model for network security situation by Leau, Yu Beng, Selvakumar Manickam

    Published 2016
    “…The proposed model applied Kalman Filtering algorithm to predict the residual in the next time-frame and closer the deviation between the predicted and actual network security situation. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Jaya algorithm hybridized with extreme gradient boosting to predict the corrosion-induced mass loss of agro-waste based monolithic and Ni-reinforced porous alumina by Dele-Afolabi, T.T., Jung, D.W., Ahmadipour, Masoud, Azmah Hanim, M.A., Adeleke, A.O., Kandasamy, M., Gunnasegaran, Prem

    Published 2024
    “…In this work, the non-linear predictive power of a hybridized machine learning prediction model, specifically Jaya-XGBoost to predict the corrosion-induced mass loss of monolithic and nickel-reinforced porous alumina ceramics has been examined. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Quantitative Computational Framework For Analyzing Evidence To Identify Attack Intention And Strategy In Network Forensics by Mosa, Mohammad Rasmi Hassun

    Published 2013
    “…The intentions are identified through a new algorithm called Attack Intention Analysis, which predicts cyber crime intentions by combining Dempster-Shafer theory and a causal network. …”
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15

    Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework by Asaad Aref, Ibrahim

    Published 2004
    “…A design proposal was outlined to provide an adaptive client/server approach to stream audio contents using Real-Time Transport Protocol (RTP) involving architecture based on the Java Media Framework (JMF) Application Programmable Interfaces (API).RTP protocol is the Internet-standard protocol for the transport of real-time data, including audio and video and can be implemented by using Java Media Framework (JMF). …”
    Get full text
    Get full text
    Thesis
  16. 16

    Steganography based on utilizing more surrounding pixels by Afrakhteh, Masoud

    Published 2010
    “…Furthermore, the method is proved to be robust against one of the common attacks to stego-images known as Chi-squared attack.…”
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18

    Implementation of (AES) Advanced Encryption Standard algorithm in communication application by Moh, Heng Huong

    Published 2014
    “…The concept of ABS algorithm was firstly studied, including the definition, historical background, and a brief comparison was made between the ABS algorithm with other types of algorithm. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  19. 19

    Pipeline Corrosion Prediction Due To Naphthenic Acid Using Auto Regressive Integrated Moving Average Method (Arima) by ALI, NURUL FATIHAH AZWANI

    Published 2019
    “…Artificial Neural Network (ANN) and ARIMA model is used as algorithm for development of prediction model. …”
    Get full text
    Get full text
    Final Year Project
  20. 20

    Host Based Intrusion Detection and Prevention Model Against DDoS Attack in Cloud Computing by Jaber, Aws Naser, Mohamad Fadli, Zolkipli, Shakir, Hasan Awni

    Published 2018
    “…The main focus of the present research is the design of a model that prevents distributed denial-of-service attacks based on host-based intrusion detection protection systems over hypervisor environments. …”
    Get full text
    Get full text
    Get full text
    Book Chapter