Search Results - (( java application using algorithm ) OR ( user solution machine algorithm ))
Search alternatives:
- machine algorithm »
- java application »
- using algorithm »
-
1
Computer Lab Timetabling Using Genetic Algorithm Case Study - Unit ICT
Published 2006“…Genetic Algorithm is one of the most popular optimization solutions used in various applications such as scheduling. …”
Get full text
Get full text
Thesis -
2
Examination timetabling using genetic algorithm case study: KUiTTHO
Published 2005“…This paper reports the powerful techniques using GA in scheduling. Examination timetabling problem is one of the applications in scheduling. …”
Get full text
Get full text
Thesis -
3
Network monopoly / Tan Kean Yeap
Published 2002“…Moreover, because of the expanding memory anda processing power of these computers, users can put the machine to work on new kinds of applications and functions. …”
Get full text
Get full text
Thesis -
4
Development of open platform controller for step-NC compliant CNC system
Published 2020“…While the UOCC AR mobile application allow users to view machining setup process through Augmented Reality guide therefore improving the average operating time for experienced users (42.46%) and non-experienced (28.36%). …”
Get full text
Get full text
Get full text
Get full text
Thesis -
5
The implications for ahybrid detection technique against malicious sqlattacks on web applications
Published 2025“…The proposed DetectCombined is an innovated technique that execute a protection code based on a sequence of three stages: filtration-validation-history, this technique produces a robust protection code that distinguish between safe SQL commands and malicious ones, and reinforce the memory of detection procedure by saving previous SQL attacks in special tables in the remote database, regardless of the types of users whether a general user of admin. The outcome of this study will add to the body of knowledge the most important and recent proposed solutions to mitigate SQL injection attack, in particular those based on machine learning algorithm…”
Get full text
Get full text
Get full text
Article -
6
Extreme learning machine for user location prediction in mobile environment
Published 2011“…This work examines the location determination techniques by attempting to determine the location of mobile users by taking advantage of SS and SQ history data and modeling the locations using the ELM algorithm. …”
Get full text
Get full text
Get full text
Article -
7
Extreme learning machine for user location prediction in mobile environment
Published 2011“…This work examines the location determination techniques by attempting to determine the location of mobile users by taking advantage of SS and SQ history data and modeling the locations using the ELM algorithm. …”
Get full text
Get full text
Get full text
Article -
8
Distributed learning based energy-efficient operations in small cell networks
Published 2023“…The thesis proposed a solution that employs unique characteristics of machine learning and game-theoretic framework to enable a model-free and energy-efficient small cell network. …”
Get full text
Get full text
Thesis -
9
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
10
-
11
-
12
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
13
Bot detection using machine learning algorithms on social media platforms
Published 2021“…Also, It will improve the level of privacy and authenticity of these platforms and related users. The research uses the bot detection technique based on machine learning algorithms. …”
Get full text
Get full text
Get full text
Proceeding Paper -
14
Investigation of An Early Prediction System of Cardiac Arrest Using Machine Learning Techniques
Published 2022“…An effective machine learning approach created from a separate examination of many machine learning algorithms in WEKA should be applied for the correct identification of heart disease. …”
Get full text
Get full text
Undergraduates Project Papers -
15
Security alert framework using dynamic tweet-based features for phishing detection on twitter
Published 2019“…However, it is observed that there are only a few machine learning solutions to detect phishing attacks on OSNs are being proposed and implemented. …”
Get full text
Get full text
Thesis -
16
The solution of 2048 puzzle game using A* algorithm / Zafhira Ismail
Published 2017Get full text
Get full text
Thesis -
17
Predicting open space parking vacancies using machine learning
Published 2023“…A custom object detector developed using the YOLOv4 algorithm was used to collect the data for training the machine learning model. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
18
Target heart rate zone detector during exercise based on real-time facial expression using single shot detection algorithm / Muhammad Azziq Shamsudin, Raihah Aminuddin and Ummu Mar...
Published 2022“…The object detection machine learning model used in this project is Single Shot Detector (SSD) algorithm. …”
Get full text
Get full text
Get full text
Book Section -
19
Dyslexia handwriting detection using Convolutional Neural Network (CNN) algorithm / Sofea Najihah Mohd Zaki
Published 2024“…Convolutional Neural Network (CNN) algorithm was chosen as one of the possible solutions after a thorough analysis of many algorithms for dyslexic handwriting identification. …”
Get full text
Get full text
Thesis -
20
