Search Results - (( java application optimisation algorithm ) OR ( using naive protocol algorithm ))

  • Showing 1 - 6 results of 6
Refine Results
  1. 1

    Text Extraction Algorithm for Web Text Classification by Theab, Mustafa Muwafak

    Published 2010
    “…The created data sets are then classified using Naive-Bayes and C4.5 algorithms provided in WEKA application. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…The system is essentially a three-part development, utilising Android, Java Servlets, and Arduino platforms to create an optimised and automated urban-gardening system. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    A behavioral trust model for internet of healthcare things using an improved FP-growth algorithm and Naïve Bayes classifier by Azad, Saiful, Amin Salem, Saleh Bllagdham, Mahmud, Mufti, Kaiser, M. Shamim, Miah, Md Saef Ullah

    Published 2021
    “…Later, these behavioral signatures are utilized in classifying incoming communication requests to either trustworthy and untrustworthy (trust) class using the Naïve Bayes classifier. The proposed model is tested on a benchmark dataset along with other similar existing models, where the proposed BMT outperforms the existing TMMs.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    Web-based expert system for material selection of natural fiber- reinforced polymer composites by Ahmed Ali, Basheer Ahmed

    Published 2015
    “…Finally, the developed expert system was deployed over the internet with central interactive interface from the server as a web-based application. As Java is platform independent and easy to be deployed in web based application and accessible through the World Wide Web (www), this expert system can be one stop application for materials selection.…”
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6

    A Machine Learning Classification Approach to Detect TLS-based Malware using Entropy-based Flow Set Features by Keshkeh, Kinan, Jantan, Aman, Alieyan, Kamal

    Published 2022
    “…Due to the complexity of TLS traffic decryption, several anomaly-based detection studies have been conducted to detect TLS-based malware using different features and machine learning (ML) algorithms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article