Search Results - (( java application interface algorithm ) OR ( attack prediction model algorithm ))
Search alternatives:
- attack prediction »
- java application »
- model algorithm »
-
1
Predicting attackers of online shaming using ant colony optimization / Noor Shafiqa Fazlien Mohamad Fauzi
Published 2020“…In order to predict the attackers of online shaming, Ant Colony Optimization Algorithm will be used and it will be compared with J48 algorithm. …”
Get full text
Get full text
Thesis -
2
-
3
Predicting the success of suicide terrorist attacks using different machine learning algorithms
Published 2022“…The main objective of our paper is to predict different types of attacks, such as successful suicide attacks, successful non-suicide attacks, unsuccessful suicide attacks, and unsuccessful non-suicide attacks. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
4
Intrusion Detection in Mobile Ad Hoc Networks Using Transductive Machine Learning Techniques
Published 2011“…The transductive conformal prediction and outlier detection have been employed for feature selection algorithm. …”
Get full text
Get full text
Get full text
Thesis -
5
Real-time algorithmic music composition application.
Published 2022“…In addition, the system also utilises JavaFx and jFugue for its graphical user interface and music programming respectively. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
A new machine learning-based hybrid intrusion detection system and intelligent routing algorithm for MPLS network
Published 2023“…The datasets are then fed into MATLAB to train ML classifiers and regression models to classify the incoming traffic as normal or attack and predict traffic delays for all available routes, respectively. …”
text::Thesis -
7
Application-Programming Interface (API) for Song Recognition Systems
Published 2024“…In addition the implementation is done by algorithm using Java’s programming language, executed through an application developed in the Android operating system. …”
Article -
8
Stress mental health symptom assessment mobile application for young adults
Published 2023“…Subsequently, employing the K-Nearest Neighbors (KNN) algorithm, the model shall forecast the likelihood of experiencing a future panic attack. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
9
Jaya algorithm hybridized with extreme gradient boosting to predict the corrosion-induced mass loss of agro-waste based monolithic and Ni-reinforced porous alumina
Published 2025“…In this work, the non-linear predictive power of a hybridized machine learning prediction model, specifically Jaya-XGBoost to predict the corrosion-induced mass loss of monolithic and nickel-reinforced porous alumina ceramics has been examined. …”
Article -
10
Visdom: Smart guide robot for visually impaired people
Published 2025“…The system architecture integrates ROS 2 on a Raspberry Pi, with TCP/IP connectivity enabling remote operation. An Android mobile application, developed using Java and the java.net.Socket library, provides an intuitive and accessible user interface for seamless interaction with the robot. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
11
An enhanced adaptive grey verhulst prediction model for network security situation
Published 2016“…The proposed model applied Kalman Filtering algorithm to predict the residual in the next time-frame and closer the deviation between the predicted and actual network security situation. …”
Get full text
Get full text
Get full text
Article -
12
Jaya algorithm hybridized with extreme gradient boosting to predict the corrosion-induced mass loss of agro-waste based monolithic and Ni-reinforced porous alumina
Published 2024“…In this work, the non-linear predictive power of a hybridized machine learning prediction model, specifically Jaya-XGBoost to predict the corrosion-induced mass loss of monolithic and nickel-reinforced porous alumina ceramics has been examined. …”
Get full text
Get full text
Get full text
Article -
13
Quantitative Computational Framework For Analyzing Evidence To Identify Attack Intention And Strategy In Network Forensics
Published 2013“…The intentions are identified through a new algorithm called Attack Intention Analysis, which predicts cyber crime intentions by combining Dempster-Shafer theory and a causal network. …”
Get full text
Get full text
Thesis -
14
Development Of Machine Learning User Interface For Pump Diagnostics
Published 2022Get full text
Get full text
Monograph -
15
Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework
Published 2004“…A design proposal was outlined to provide an adaptive client/server approach to stream audio contents using Real-Time Transport Protocol (RTP) involving architecture based on the Java Media Framework (JMF) Application Programmable Interfaces (API).RTP protocol is the Internet-standard protocol for the transport of real-time data, including audio and video and can be implemented by using Java Media Framework (JMF). …”
Get full text
Get full text
Thesis -
16
Steganography based on utilizing more surrounding pixels
Published 2010“…Furthermore, the method is proved to be robust against one of the common attacks to stego-images known as Chi-squared attack.…”
Get full text
Get full text
Thesis -
17
Movie recommendation system / Najwa Syamimie Hasnu
Published 2020Get full text
Get full text
Thesis -
18
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…The concept of ABS algorithm was firstly studied, including the definition, historical background, and a brief comparison was made between the ABS algorithm with other types of algorithm. …”
Get full text
Get full text
Undergraduates Project Papers -
19
Pipeline Corrosion Prediction Due To Naphthenic Acid Using Auto Regressive Integrated Moving Average Method (Arima)
Published 2019“…Artificial Neural Network (ANN) and ARIMA model is used as algorithm for development of prediction model. …”
Get full text
Get full text
Final Year Project -
20
Host Based Intrusion Detection and Prevention Model Against DDoS Attack in Cloud Computing
Published 2018“…The main focus of the present research is the design of a model that prevents distributed denial-of-service attacks based on host-based intrusion detection protection systems over hypervisor environments. …”
Get full text
Get full text
Get full text
Book Chapter
