Search Results - (( intelligence valid tree algorithm ) OR ( intelligence system rsa algorithm ))
Search alternatives:
- intelligence system »
- intelligence valid »
- tree algorithm »
- rsa algorithm »
- system rsa »
-
1
Privacy in medical emergency system: cryptographic and security aspects
Published 2010Get full text
Get full text
Get full text
Proceeding Paper -
2
Secure Image Steganography Using Encryption Algorithm
Published 2016Get full text
Get full text
Conference or Workshop Item -
3
-
4
Data Classification and Its Application in Credit Card Approval
Published 2004“…This project is involved with identification of the available algorithms used in data classification and the implementation of C4.5 decision tree induction algorithm in solving the data classifying task. …”
Get full text
Get full text
Final Year Project -
5
-
6
New approach of cryptography algorithm for e- mail applications
Published 2005Get full text
Get full text
Conference or Workshop Item -
7
A case study of microarray breast cancer classification using machine learning algorithms with grid search cross validation
Published 2023“…Grid search cross validation (CV) is applied for hyperparameter tuning of the algorithms. …”
Get full text
Get full text
Get full text
Article -
8
An optimized variant of machine learning algorithm for datadriven electrical energy efficiency management (D2EEM)
Published 2024“…Finally, the proposed algorithms were also validated on another dataset of a university campus in a different region. …”
Get full text
Get full text
Thesis -
9
Quantum-Resistant Cryptography in Cyber Security
Published 2025“…Quantum algorithms including Shor’s and Grover’s are expected to compromise these systems, placing sensitive data, financial infrastructures, and national security at risk. …”
Get full text
Get full text
Get full text
Get full text
Article -
10
Knowledge discovery in distance relay event report: a comparative data-mining strategy of rough set theory with decision tree
Published 2010“…These rules would then be compared with and validated by benchmarking decision-tree-based data-mining analysis.…”
Get full text
Get full text
Get full text
Article -
11
Application of sampling-based motion planning algorithms in autonomous vehicle navigation
Published 2016“…The performance of the proposed method is tested through simulation in different scenarios and also by comparing the performances of RRT and RRT* algorithms. The proposed method provides near-optimal solutions with smaller trees and in lower running time.…”
Get full text
Get full text
Get full text
Book Section -
12
Discovering decision algorithm of distance protective relay based on rough set theory and rule quality measure
Published 2011“…The discovered decision algorithm and association rule from the Rough-Set based data mining had been compared with and successfully validated by those discovered using the benchmarking Decision-Tree based data mining strategy. …”
Get full text
Get full text
Thesis -
13
Adaptive resource allocation algorithms with QoS support based on network conditions using fuzzy logic system for IEEE 802.11n networks / Bakeel Hussein Naji Maqhat
Published 2016“…The second contribution is an efficient bandwidth allocation algorithm for A-MSDU aggregation called Adaptive Scheduling based Embedded Fuzzy (ASEF) system. …”
Get full text
Get full text
Thesis -
14
-
15
Green building valuation based on machine learning algorithms / Thuraiya Mohd ... [et al.]
Published 2021“…This experiment used five common machine learning algorithms namely 1) Linear Regressor, 2) Decision Tree Regressor, 3) Random Forest Regressor, 4) Ridge Regressor and 5) Lasso Regressor tested on a real estate data-set of covering Kuala Lumpur District, Malaysia. 3 set of experiments was conducted based on the different feature selections and purposes The results show that the implementation of 16 variables based on Experiment 2 has given a promising effect on the model compare the other experiment, and the Random Forest Regressor by using the Split approach for training and validating data-set outperformed other algorithms compared to Cross-Validation approach. …”
Get full text
Get full text
Conference or Workshop Item -
16
Intelligent grading of agarwood essential oil quality using artificial neural network (ANN) / Noratikah Zawani Mahabob
Published 2022“…The training and validation of the ANN was based on optimization of its training parameters and guided by the convergence of the mean squared errors (MSE). …”
Get full text
Get full text
Thesis -
17
Neutralisation state driven single-agent search strategy for solving constraint satisfaction problem / Saajid Akram Ahmed Abuluaih
Published 2019“…Since Constraint Satisfaction Problem (CSP) is an NP-complete problem, brute-force search algorithms such as Backtracking algorithm (BT) are required as the guarantee to find a solution, when there is one. …”
Get full text
Get full text
Thesis -
18
Enhancing fairness and efficiency in teacher placement based on staff placement model: an intelligent teacher placement selection model for Ministry of Education Malaysia
Published 2025“…The effectiveness of ITPS was evaluated using five machine learning algorithms: J48, Decision Tree, Naïve Bayes, Random Forest, and K-Nearest Neighbors. …”
Get full text
Get full text
Get full text
Article -
19
Modeling of static and dynamic components of bio-nanorobotic systems
Published 2012“…In addition, a graph algorithm based on greedy methods is employed to compute a new set of optimal weighted electronic properties of the fullerenes via computing their Minimum Weight Spanning Trees (MWSTs). …”
Get full text
Get full text
Thesis -
20
A proposed model for text and image encryption using different techniques
Published 2023“…In this research paper, a new intelligent system that concentrates on image and text encryption and decryption is proposed. …”
Article
