Search Results - (( developing internet tree algorithm ) OR ( java implication based algorithm ))

Refine Results
  1. 1

    Algorithm for the legal regulation of internet financial crime by Ambaras Khan, Hanna, Ab. Rahman, Suhaimi, Xinxin, Mao

    Published 2024
    “…Data processing for criminal acts on Internet finance platforms is crucial, with the utilization of random forest algorithms, including Decision tree and Bagging integration algorithms. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    A novel steganography algorithm using edge detection and MPC algorithm by Aref Rezaei, Leili Farzinvash, Ali Farzamnia

    Published 2019
    “…With the rapid development of the Internet, preserving the security of confidential data has become a challenging issue. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    QoS Forwarding on the Optical Internet Backbone Area Using R-IWDMTC Protocol by Addie Irawan, Hashim, R. Badlishah, Ahmad

    Published 2006
    “…(Extended via Multi-protocol Label Switching (MPLS)) provides connection-oriented setup and multicast tree construction control for Optical Internet data forwarding in the network backbone area. …”
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    E2IDS: an enhanced intelligent intrusion detection system based on decision tree algorithm by Bouke, Mohamed Aly, Abdullah, Azizol, ALshatebi, Sameer Hamoud, Abdullah, Mohd Taufik

    Published 2022
    “…Due to the increased usage of the Internet of Things and heterogeneous distributed devices, the development of effective and reliable intrusion detection systems (IDS) has become more critical. …”
    Get full text
    Get full text
    Article
  5. 5
  6. 6
  7. 7

    Framework for mining XML format business process log data by Ang, Jin Sheng

    Published 2024
    “…Therefore, a lot of frequent subtree mining (FSM) algorithms and methods were developed to get information from semi-structured data specifically data with hierarchical nature. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Intersection Features For Android Botnet Classification by Ismail, Najiahtul Syafiqah, Yusof, Robiah, Saad, Halizah, Abdollah, Mohd Faizal, Yusof, Robiah

    Published 2019
    “…The Chi Square was used to select the most significant permissions, then the classification algorithms like Naïve Bayes and Decision Tree were used to classify the Android apps as botnet or benign apps. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Predicting customer churn in telecommunication service provider industry using Random Forest / Wan Muhammad Naqib Zafran Wan Roslan by Wan Roslan, Wan Muhammad Naqib Zafran

    Published 2023
    “…This project addresses the challenge of customer churn in the Telecommunications Service Provider (TSP) industry by focusing on the Random Forest algorithm for predictive modeling. This study aims to throughly explore the Random Forest algorithm, develop a robust Random Forest customer churn predictive model, and evaluate its performance in predicting customer churn within the internet service provider sector. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Internet of Things (IoT) intrusion detection by Machine Learning (ML): a review by Dehkordi, Iman Farhadian, Manochehri, Kooroush, Aghazarian, Vahe

    Published 2023
    “…The goal of this study is to show the results of analyzing various classification algorithms in terms of confusion matrix, accuracy, precision, specificity, sensitivity, and f-score to Develop an Intrusion Detection System (IDS) model.…”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Phishing attack detection using machine learning method by Jupin, John Arthur

    Published 2019
    “…The Naïve Bayes algorithm, Decision Tree algorithm and Support Vector Machine algorithm has been used to prevent the spam attack, as well as the phishing attack. …”
    Get full text
    Get full text
    Get full text
    Undergraduates Project Papers
  12. 12
  13. 13
  14. 14
  15. 15

    Anomaly detection in network traffic using machine learning by Amir Muhammad Hafiz, Othman, Mohd Faizal, Ab Razak, Mohd Izham, Mohd Jaya, Nurul Azma, Abdullah, Alanda, Alde

    Published 2026
    “…Five (5) performance metrics, which are accuracy, precision, recall, and f-measure, are utilized to assess the result of each algorithm. The results highlight that the KNN algorithm achieves the highest accuracy, at 97%, while the ID3 algorithm produces a balanced trade-off between performance and efficiency. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Gateway placement optimisation problem for mobile multicast design in wireless mesh networks by Sanni, Mistura L., Hassan Abdalla Hashim, Aisha, Anwar, Farhat, Naji, Ahmed Wathik

    Published 2012
    “…Furthermore, the paper develops the sketch of modeling and formulation of IGW placement problem with the objective of optimising IGW placement while cost of multicast tree and mobility are optimised. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  17. 17
  18. 18

    Insomnia audio therapy mobile application with music recommender system / Nur Azmina Mohamad Zamani, Nasiroh Omar and Nur Damira Huda Azmi by Mohamad Zamani, Nur Azmina, Omar, Nasiroh, Azmi, Nur Damira Huda

    Published 2022
    “…With the quick advancement of Internet and artificial intelligence technologies, development of a robust and accurate music recommendation system has become an important issue in the field of music information retrieval. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19
  20. 20

    Efficient flow-based channel assignment schemes for congestion avoidance in wireless mesh networks by Abdulla Mogaibel, Hassen Abd-Almotaleb

    Published 2016
    “…In addition, a hybrid interface assignment strategy is developed based on the spanning tree structure of the gateway traffic. …”
    Get full text
    Get full text
    Thesis