Search Results - (( developing program tree algorithm ) OR ( based applications security algorithm ))
Search alternatives:
- developing program »
- based applications »
- tree algorithm »
- program tree »
-
1
A new mobile botnet classification based on permission and API calls
Published 2024Conference Paper -
2
Enhanced dynamic security assessment for power system under normal and fake tripping contingencies.
Published 2019“…The hybrid logistic model tree (hybrid LMT) approach proposed in this study combines the symmetrical uncertainties (SU) algorithm and the logistic model tree (LMT) algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
3
Classification of Google Play application using decision tree algorithm on sentiment analysis of text reviews / Aqil Khairy Hamsani, Ummu Fatihah Mohd Bahrin and Wan Dorishah Wan A...
Published 2023“…The project's objectives are to study the classifying approach of Google Play Store application reviews using the Decision Tree algorithm, develop a prototype of a classifying application program, and evaluate the accuracy model of the review classification program. …”
Get full text
Get full text
Get full text
Article -
4
Classification model for hotspot occurrences using spatial decision tree algorithm
Published 2013“…This study describes the application of data mining technique namely decision tree on forest fires data. We improved the ID3 decision tree algorithm such that it can be utilized on spatial data in order to develop a classification model for hotspots occurrence. …”
Get full text
Get full text
Get full text
Article -
5
-
6
Evaluation of data mining classification and clustering techniques for diabetes / Tuba Pala and Ali Yilmaz Camurcu
Published 2014“…Multilayer Perceptron algorithm has been the best algorithm with the highest success percentage in both of the programs; Decision Trees has been the algorithm which has the lowest success percentage again in both of the programs. …”
Get full text
Get full text
Get full text
Article -
7
-
8
Tracking student performance in introductory programming by means of machine learning
Published 2023Conference Paper -
9
Enhanced chaotic image encryption algorithm based on Baker's map
Published 2003Get full text
Get full text
Article -
10
Trust-based enhanced ACO algorithm for secure routing in IoT
Published 2024“…In order to provide an energy-efficient and secure routing method for sensors deployed within a dynamic IoT network, this paper presents a trust-aware enhanced ant colony optimization (ACO)-based routing algorithm, incorporating a lightweight trust evaluation model. …”
Get full text
Get full text
Get full text
Get full text
Article -
11
Secure ACO-Based Wireless Sensor Network Routing Algorithm for IoT
Published 2021Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
12
A trust aware secure ant colony optimization based routing algorithm for Internet of Things
Published 2023“…With the rapid spread of Internet of Things (IoT) systems enhancing the development of IoT applications, the issue of designing a secure routing algorithm for IoT, including reasonable trust management, has attracted more and more research attention. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
13
Secured Autonomous Agent-Based Intrusion Detection System (SAAIDS)
Published 2024thesis::master thesis -
14
-
15
-
16
A secure trust aware ACO-Based WSN routing protocol for IoT
Published 2022“…The performance of the proposed routing algorithm is demonstrated through MATLAB. Based on the proposed system, to find the secure and optimal path while aiming at providing trust in IoT environment, the average energy consumption is minimized by nearly 50% even as the number of nodes has increased, as compared with the conventional ACO algorithm, a current ant-based routing algorithm for IoT-communication, and a present routing protocol RPL for IoT.…”
Get full text
Get full text
Get full text
Article -
17
Prime-based method for interactive mining of frequent patterns
Published 2010Get full text
Get full text
Thesis -
18
-
19
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
20
Modified Data Encryption Standard Algorithm for Textbased Applications
Published 2006“…Because of its short time execution and higher authentication, using this algorithm will ensure the security for internet applications.…”
Get full text
Get full text
Thesis
