Search Results - (( developing services tree algorithm ) OR ( java optimization path algorithm ))
Search alternatives:
- developing services »
- java optimization »
- optimization path »
- tree algorithm »
- path algorithm »
- services tree »
-
1
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…BST inserts the nodes in the way that the Dijkstra’s can find the empty parking in fastest way. Dijkstra’s algorithm initials the paths to finding the shortest path while ACO optimizes the paths. …”
Get full text
Get full text
Thesis -
2
SecPath: Energy efficient path reconstruction in wireless sensor network using iterative smoothing
Published 2019“…This work uses iterative smoothing algorithm to find an alternative path with less distance and energy consumption. …”
Get full text
Get full text
Thesis -
3
Energy efficient path reconstruction in wireless sensor network using iPath
Published 2019“…This work uses iterative boosting algorithm to find an alternative path with less distance and energy consumption. …”
Get full text
Get full text
Get full text
Article -
4
Visdom: Smart guide robot for visually impaired people
Published 2025“…Core functionalities such as path planning, autonomous movement, voice feedback, and app-to-robot communication have been thoroughly tested and optimized. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
5
Novel approach for IP-PBX denial of service intrusion detection using support vector machine algorithm
Published 2021“…In this research, Support Vector Machine (SVM) machine learning detection & prevention algorithm were developed to detect this type of attacks Two other techniques were benchmarked decision tree and Naïve Bayes. …”
Get full text
Get full text
Get full text
Get full text
Article -
6
A Bio-Inspired Territorial Predator Scent Marking Algorithm in Software-Defined Data Center
Published 2023Conference Paper -
7
A Proposed False Report Identification Algorithm for a Mobile Application in the IoT Environment
Published 2024Proceedings Paper -
8
Sales prediction of religious product and services of Mutawwif Haramain Travel & Tours using predictive analytics
Published 2025“…This research develops a predictive model for sales prediction at Mutawwif Haramain Travel & Tours, utilizing machine learning algorithms, specifically Decision Tree, Random Forest, and Naive Bayes, to uncover patterns in customer behavior and seasonal demand. …”
Get full text
Get full text
Student Project -
9
Constructing routing tree for centralized scheduling using multi-channel single transceiver system in 802.16 mesh mode
Published 2008“…This paper proposes a centralized scheduling algorithm that can reduce interferences by constructing routing tree with multi-channel single transceiver system in WiMAX mesh networks. …”
Get full text
Get full text
Conference or Workshop Item -
10
Predicting customer churn in telecommunication service provider industry using Random Forest / Wan Muhammad Naqib Zafran Wan Roslan
Published 2023“…This study aims to throughly explore the Random Forest algorithm, develop a robust Random Forest customer churn predictive model, and evaluate its performance in predicting customer churn within the internet service provider sector. …”
Get full text
Get full text
Thesis -
11
-
12
Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction
Published 2022“…It leads to network disturbances, interruption of communication and significant damage to services. Researchers seek to develop intelligent algorithms to detect and prevent DDoS attacks. …”
Get full text
Get full text
Get full text
Article -
13
Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction
Published 2022“…It leads to network disturbances, interruption of communication and significant damage to services. Researchers seek to develop intelligent algorithms to detect and prevent DDoS attacks. …”
Get full text
Get full text
Get full text
Article -
14
Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction
Published 2022“…It leads to network disturbances, interruption of communication and significant damage to services. Researchers seek to develop intelligent algorithms to detect and prevent DDoS attacks. …”
Get full text
Get full text
Get full text
Article -
15
Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction
Published 2022“…It leads to network disturbances, interruption of communication and significant damage to services. Researchers seek to develop intelligent algorithms to detect and prevent DDoS attacks. …”
Get full text
Get full text
Get full text
Article -
16
Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction
Published 2023“…It leads to network disturbances, interruption of communication and significant damage to services. Researchers seek to develop intelligent algorithms to detect and prevent DDoS attacks. …”
Get full text
Get full text
Get full text
Article -
17
Enhance efficiency of answering XML keyword query using incompact structure of MCCTree
Published 2012“…If the result cannot be used directly by the ranking method, the algorithm has an ineffective process. Moreover, if the ineffective process requires re-examining the original tree, the efficiency of the process of the algorithm will be reduced. …”
Get full text
Get full text
Thesis -
18
Car dealership web application
Published 2022“…The transfer learning algorithm pre-trained the River adaptive random forest regressor and classifier by transferring the tree structures and weights from the Scikit-learn fitted random forest regressor and classifier, respectively. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
19
Cloud Worm Detection and Response Technique By Integrating The Enhanced Genetic Algorithm An Threat Level
Published 2024thesis::doctoral thesis -
20
A simultaneous spam and phishing attack detection framework for short message service based on text mining approach
Published 2017“…There are five (5) Classification techniques used such as Naive Bayes, K-NN, Decision Tree, Random Tree and Decision Stump. The result of Hybrid Feature accuracy using Rapidminer and Naive Bayes technique is 77.47%, for K-NN: 78.56%, Decision Tree: 57.16%, Random Tree: 57.24% and Decision Stump: 57.16%. …”
Get full text
Get full text
Get full text
Thesis
