Search Results - (( developing internet tree algorithm ) OR ( java implication based algorithm ))
Search alternatives:
- developing internet »
- implication based »
- java implication »
- tree algorithm »
- internet tree »
-
1
Algorithm for the legal regulation of internet financial crime
Published 2024“…Data processing for criminal acts on Internet finance platforms is crucial, with the utilization of random forest algorithms, including Decision tree and Bagging integration algorithms. …”
Get full text
Get full text
Get full text
Article -
2
A novel steganography algorithm using edge detection and MPC algorithm
Published 2019“…With the rapid development of the Internet, preserving the security of confidential data has become a challenging issue. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
3
QoS Forwarding on the Optical Internet Backbone Area Using R-IWDMTC Protocol
Published 2006“…(Extended via Multi-protocol Label Switching (MPLS)) provides connection-oriented setup and multicast tree construction control for Optical Internet data forwarding in the network backbone area. …”
Get full text
Get full text
Conference or Workshop Item -
4
E2IDS: an enhanced intelligent intrusion detection system based on decision tree algorithm
Published 2022“…Due to the increased usage of the Internet of Things and heterogeneous distributed devices, the development of effective and reliable intrusion detection systems (IDS) has become more critical. …”
Get full text
Get full text
Article -
5
Algorithm Development of Bidirectional Agglomerative Hierarchical Clustering Using AVL Tree with Visualization
Published 2024thesis::doctoral thesis -
6
-
7
Framework for mining XML format business process log data
Published 2024“…Therefore, a lot of frequent subtree mining (FSM) algorithms and methods were developed to get information from semi-structured data specifically data with hierarchical nature. …”
Get full text
Get full text
Thesis -
8
Intersection Features For Android Botnet Classification
Published 2019“…The Chi Square was used to select the most significant permissions, then the classification algorithms like Naïve Bayes and Decision Tree were used to classify the Android apps as botnet or benign apps. …”
Get full text
Get full text
Get full text
Article -
9
Predicting customer churn in telecommunication service provider industry using Random Forest / Wan Muhammad Naqib Zafran Wan Roslan
Published 2023“…This project addresses the challenge of customer churn in the Telecommunications Service Provider (TSP) industry by focusing on the Random Forest algorithm for predictive modeling. This study aims to throughly explore the Random Forest algorithm, develop a robust Random Forest customer churn predictive model, and evaluate its performance in predicting customer churn within the internet service provider sector. …”
Get full text
Get full text
Thesis -
10
Internet of Things (IoT) intrusion detection by Machine Learning (ML): a review
Published 2023“…The goal of this study is to show the results of analyzing various classification algorithms in terms of confusion matrix, accuracy, precision, specificity, sensitivity, and f-score to Develop an Intrusion Detection System (IDS) model.…”
Get full text
Get full text
Get full text
Article -
11
Phishing attack detection using machine learning method
Published 2019“…The Naïve Bayes algorithm, Decision Tree algorithm and Support Vector Machine algorithm has been used to prevent the spam attack, as well as the phishing attack. …”
Get full text
Get full text
Get full text
Undergraduates Project Papers -
12
Centralized scheduling, routing tree in WiMAX mesh networks
Published 2008Get full text
Get full text
Conference or Workshop Item -
13
-
14
Review and analysis of risk factor of maternal health in remote area using the Internet of Things (IoT)
Published 2020Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
15
Anomaly detection in network traffic using machine learning
Published 2026“…Five (5) performance metrics, which are accuracy, precision, recall, and f-measure, are utilized to assess the result of each algorithm. The results highlight that the KNN algorithm achieves the highest accuracy, at 97%, while the ID3 algorithm produces a balanced trade-off between performance and efficiency. …”
Get full text
Get full text
Get full text
Article -
16
Gateway placement optimisation problem for mobile multicast design in wireless mesh networks
Published 2012“…Furthermore, the paper develops the sketch of modeling and formulation of IGW placement problem with the objective of optimising IGW placement while cost of multicast tree and mobility are optimised. …”
Get full text
Get full text
Get full text
Proceeding Paper -
17
-
18
Insomnia audio therapy mobile application with music recommender system / Nur Azmina Mohamad Zamani, Nasiroh Omar and Nur Damira Huda Azmi
Published 2022“…With the quick advancement of Internet and artificial intelligence technologies, development of a robust and accurate music recommendation system has become an important issue in the field of music information retrieval. …”
Get full text
Get full text
Get full text
Article -
19
Digital Quran With Storage Optimization Through Duplication Handling And Compressed Sparse Matrix Method
Published 2024thesis::doctoral thesis -
20
Efficient flow-based channel assignment schemes for congestion avoidance in wireless mesh networks
Published 2016“…In addition, a hybrid interface assignment strategy is developed based on the spanning tree structure of the gateway traffic. …”
Get full text
Get full text
Thesis
