Search Results - (( java application optimisation algorithm ) OR ( security classification rules algorithm ))

  • Showing 1 - 13 results of 13
Refine Results
  1. 1

    An analysis of intrusion detection classification using supervised machine learning algorithms on NSL-KDD dataset / Sarthak Rastogi ... [et al.] by Rastogi, Sarthak, Shrotriya, Archit, Singh, Mitul Kumar, Potukuchi, Raghu Vamsi

    Published 2022
    “…Conventional IDS are less accurate in detecting anomalies because of the decision taking based on rules. The IDS with machine learning method improves the detection accuracy of the security attacks. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2
  3. 3

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…The system is essentially a three-part development, utilising Android, Java Servlets, and Arduino platforms to create an optimised and automated urban-gardening system. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    A framework for malware identification based on behavior by Mohamad Fadli, Zolkipli

    Published 2012
    “…The IF-THEN Prediction Rules which is generated using the data mining technique, ID3 Algorithm is used. …”
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6

    Fusion of license plate and face recognition for secure parking / Siti Salwa Md Noor by Md Noor, Siti Salwa

    Published 2013
    “…The accuracy rate attained is based on implementation of decision fusion using AND rule during classification. Experiments attained a total success rate (TSR) of 96% during parking based on plate recognition only and over 99% TSR during exit based on fusion of plate and face recognition at PSR value of 10. …”
    Get full text
    Get full text
    Thesis
  7. 7

    A collision resistant cryptographic hash function based on cellular automata rules by Jamil, Norziana

    Published 2013
    “…The framework divides requirements for the design of hash function into three classifications namely design requirements, security requirements for Boolean function and analysis requirements. …”
    Get full text
    Get full text
    Thesis
  8. 8

    An Enhanced Ant Colony Optimisation Algorithm with the Hellinger Distance for Shariah-Compliant Securities Companies Bankruptcy Prediction by Zainol, Annuur Zakiah, Saian, Rizauddin, Teoh, Yeong Kin, Mohd Razali, Muhammad Hasbullah, Abu Bakar, Sumarni

    Published 2024
    “…Although the number of rules and conditions is not statistically significant, HD-AntMiner emerges as a robust algorithm for enhancing classification accuracy in imbalanced datasets, particularly in the context of Shariah-compliant securities prediction.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  9. 9
  10. 10
  11. 11

    A new integrated approach for evaluating sustainable development in the electric vehicle sector by Lu, Wen Min, Chou, Chienheng, Ting, Irene Wei Kiong, Liu, Shangming

    Published 2025
    “…Third, this study uses the classification & regression tree (CART), random forest, and eXtreme gradient boosting (XGBoost) algorithms to assist managers in identifying the key predictive variables for further classification and prediction. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Web-based expert system for material selection of natural fiber- reinforced polymer composites by Ahmed Ali, Basheer Ahmed

    Published 2015
    “…Finally, the developed expert system was deployed over the internet with central interactive interface from the server as a web-based application. As Java is platform independent and easy to be deployed in web based application and accessible through the World Wide Web (www), this expert system can be one stop application for materials selection.…”
    Get full text
    Get full text
    Thesis
  13. 13

    Enhanced Adaptive Neuro-Fuzzy Inference System Classification Method for Intrusion Detection by Jia, Liu

    Published 2024
    “…Additionally, standard deviation and proposed adaptive K-means algorithms have been employed to minimize the generated rules by ANFIS from the proposed hybrid models. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis