Search Results - (( develop reduction tree algorithm ) OR ( java implication based algorithm ))

Refine Results
  1. 1

    Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction by Dheyab, Saad Ahmed, Mohammed Abdulameer, Shaymaa, Mostafa, Salama A

    Published 2022
    “…Subsequently, DDoS attack detection is performed based on random forest (RF) and decision tree (DT) algorithms. The model is implemented and tested on the CICDDoS2019 dataset using different data dimensionality reduction test scenarios. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction by Dheyab, Saad Ahmed, Mohammed Abdulameer, Shaymaa, Mostafa, Salama A.

    Published 2022
    “…Subsequently, DDoS attack detection is performed based on random forest (RF) and decision tree (DT) algorithms. The model is implemented and tested on the CICDDoS2019 dataset using different data dimensionality reduction test scenarios. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction by Ahmed Dheyab, Saad, Mohammed Abdulameer, Shaymaa, Mostafa, Salama A

    Published 2022
    “…Subsequently, DDoS attack detection is performed based on random forest (RF) and decision tree (DT) algorithms. The model is implemented and tested on the CICDDoS2019 dataset using different data dimensionality reduction test scenarios. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction by Dheyab, Saad Ahmed, Mohammed Abdulameer, Shaymaa, Mostafa, Salama

    Published 2022
    “…Subsequently, DDoS attack detection is performed based on random forest (RF) and decision tree (DT) algorithms. The model is implemented and tested on the CICDDoS2019 dataset using different data dimensionality reduction test scenarios. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction by Dheyab, Saad Ahmed, Mohammed Abdulameer, Shaymaa, Mostafa, Salama

    Published 2023
    “…Subsequently, DDoS attack detection is performed based on random forest (RF) and decision tree (DT) algorithms. The model is implemented and tested on the CICDDoS2019 dataset using different data dimensionality reduction test scenarios. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    New Learning Models for Generating Classification Rules Based on Rough Set Approach by Al Shalabi, Luai Abdel Lateef

    Published 2000
    “…Two different models for learning in data sets were proposed based on two different reduction algorithms. The split-condition-merge-reduct algorithm ( SCMR) was performed on three different modules: partitioning the data set vertically into subsets, applying rough set concepts of reduction to each subset, and merging the reducts of all subsets to form the best reduct. …”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8
  9. 9
  10. 10

    Algorithm for the legal regulation of internet financial crime by Ambaras Khan, Hanna, Ab. Rahman, Suhaimi, Xinxin, Mao

    Published 2024
    “…Data processing for criminal acts on Internet finance platforms is crucial, with the utilization of random forest algorithms, including Decision tree and Bagging integration algorithms. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Detecting Malware with Classification Machine Learning Techniques by Mohd Yusof, Mohd Azahari, Abdullah, Zubaile, Hamid Ali, Firkhan Ali, Mohamad Sukri, Khairul Amin, Shaker Hussain, Hanizan

    Published 2023
    “…The study assesses the effectiveness of several algorithms, including Naïve Bayes, Support Vector Machine (SVM), KNearest Neighbor (KNN), Decision Tree, Random Forest, and Logistic Regression, through an examination of a publicly accessible dataset featuring both benign files and malware. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Detecting Malware with Classification Machine Learning Techniques by Mohd Yusof, Mohd Azahari, Abdullah, Zubaile, Hamid Ali, Firkhan Ali, Mohamad Sukri, Khairul Amin, Shaker Hussain, Hanizan

    Published 2023
    “…The study assesses the effectiveness of several algorithms, including Naïve Bayes, Support Vector Machine (SVM), KNearest Neighbor (KNN), Decision Tree, Random Forest, and Logistic Regression, through an examination of a publicly accessible dataset featuring both benign files and malware. …”
    Get full text
    Get full text
    Article
  13. 13

    Drone-based surveillance of palm tress ecosystems by Mansor, Ya’akob, Baki, Sharudin Omar, Sahwee, Zulhilmy, Mengyue, Cheng, Wu, Yuanyuan

    Published 2024
    “…Overall, this research contributes to the advancement of oil palm tree health detection systems, providing valuable insights for future developments in agricultural surveillance and monitoring technologies.…”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Prospects for basal stem rot disease based on soil apparent electrical conductivity in oil palm plantation by Mohd Husin, Ezrin

    Published 2020
    “…Furthermore, the software was developed by using MATLAB to produce a predicted BSR map in oil palm plantation based on the developed algorithm. …”
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16

    A Comparative Analysis of Peak Load Shaving Strategies for Isolated Microgrid Using Actual Data by Rana, M.M., Rahman, A., Uddin, M., Sarkar, M.R., Shezan, S.A., Ishraque, M.F., Rafin, S.M.S.H., Atef, M.

    Published 2022
    “…This paper presents a comparative analysis of a categorical variable decision tree algorithm (CVDTA) with the most common peak shaving technique, namely, the general capacity addition technique, to evaluate the peak shaving performance for an IMG system. …”
    Get full text
    Get full text
    Article
  17. 17

    Efficient flow-based channel assignment schemes for congestion avoidance in wireless mesh networks by Abdulla Mogaibel, Hassen Abd-Almotaleb

    Published 2016
    “…In addition, a hybrid interface assignment strategy is developed based on the spanning tree structure of the gateway traffic. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Predicting open space parking vacancies using machine learning by Lee, Wei Jun

    Published 2023
    “…A custom object detector developed using the YOLOv4 algorithm was used to collect the data for training the machine learning model. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  19. 19
  20. 20

    Deep learning-based breast cancer detection and classification using histopathology images / Ghulam Murtaza by Ghulam , Murtaza

    Published 2021
    “…For BrC detection, an efficient and reliable model namely Ensemble BrC Detection Network (EBrC-Net) and three misclassification reduction (McR) algorithms are developed. The proposed EBrC-Net model is based on deep learning (DL) based approach. …”
    Get full text
    Get full text
    Get full text
    Thesis