Search Results - (( developing trust detection algorithm ) OR ( java implementation mining algorithm ))
Search alternatives:
- implementation mining »
- java implementation »
- developing trust »
- mining algorithm »
- trust detection »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
2
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
Get full text
Get full text
Get full text
Article -
3
Scalable approach for mining association rules from structured XML data
Published 2009“…Many techniques have been proposed to tackle the problem of mining XML data we study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
Get full text
Get full text
Conference or Workshop Item -
4
Mining association rules from structured XML data
Published 2009“…Many techniques have been proposed to tackle the problem of mining XML data. We study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
Get full text
Get full text
Conference or Workshop Item -
5
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Image clustering comparison of two color segmentation techniques
Published 2010“…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
Get full text
Get full text
Thesis -
8
iBUST: An intelligent behavioural trust model for securing industrial cyber-physical systems
Published 2024“…Therefore, this paper proposes an ARL-based intelligent Behavioural Trust Model (iBUST) for securing the CPPS. For this intelligent TMM, a variant of Frequency Pattern Growth (FP-Growth), called enhanced FP-Growth (EFP-Growth) algorithm is developed by altering the internal data structures for faster execution and by developing a modified exponential decay function (MEDF) to automatically calculate minimum supports for adapting trust evolution characteristics. …”
Get full text
Get full text
Get full text
Article -
9
BIOLOGICAL INSPIRED INTRUSION PREVENTION AND SELF-HEALING SYSTEM FOR CRITICAL SERVICES NETWORK
Published 2011“…New benchmarking metrics for detection capabilities, prevention predictability trust and self-healing reliability are introduced as contributions for the IPS and SH system measuring and validation. …”
Get full text
Get full text
Thesis -
10
Detection of black hole nodes in mobile ad hoc network using hybrid trustworthiness and energy consumption techniques
Published 2017“…In this thesis, a hybrid detection algorithm mechanism has been proposed which combines two detection algorithms based on nodes’ trustworthiness and energy consumption in a parallel manner in order to detect the black hole nodes. …”
Get full text
Get full text
Get full text
Thesis -
11
A Bio-Inspired Behavior-Based Hybrid Framework for Ransomware Detection
Published 2026journal-article -
12
A security payment model for financial payment using mykad
Published 2011“…However, if attack or intrusion is detected in less than 30 minutes, ARSA will automatically change the security algorithm to a new one. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
13
Trust-aware authentication and authorization for IoT: a federated machine learning approach
Published 2024“…The proposed solution for AA IoT utilizes a trust calculation algorithm based on Federated Learning (FL), which is suitable for IoT environments and enables data privacy and scalability. …”
Get full text
Get full text
Get full text
Get full text
Article -
14
Security testing of web applications for detecting and removing second-order SQL injection vulnerabilities
Published 2022“…This technique also applies the removing algorithm, which uses escaping method to remove the detected vulnerabilities. …”
Get full text
Get full text
Thesis -
15
Efficient node cooperation stimulation mechanism in wireless multihop networks
Published 2017“…The mechanism is called Trust Features-based Evidence (TFE) which is developed based on significant and unique trust features to ensure that the reported information is of actual behaviour of an observed node. …”
Get full text
Get full text
Get full text
Thesis -
16
Car dealership web application
Published 2022“…Thus, explainable AI and AI monitoring become the integral components for any new development of commercial applications, including used car dealership web application. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis
