Search Results - (( java implementation modified algorithm ) OR ( using message tree algorithm ))

Refine Results
  1. 1

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Novel approach for IP-PBX denial of service intrusion detection using support vector machine algorithm by Jama, Abdirisaq M., Khalifa, Othman Omran, Subramaniam, Nantha Kumar

    Published 2021
    “…Proposed SVM algorithm achieved the lowest false negative value of (87 messages) while decision table and Naïve Bayes achieved false negative messages of 672 and 1359, respectively…”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    A simultaneous spam and phishing attack detection framework for short message service based on text mining approach by Mohd Foozy, Cik Feresa

    Published 2017
    “…The Phishing Rule-Based algorithm is used to extract SMS Phishing. For Module 2, the SMS Attack Profiling algorithm is used in order to produce SMS Spam and Phishing words. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT by Murad S.S., Badeel R., Alsandi N.S.A., Alshaaya R.F., Ahmed R.A., Muhammed A., Derahman M.

    Published 2023
    “…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
    Review
  5. 5

    Phishing attack detection using machine learning method by Jupin, John Arthur

    Published 2019
    “…The Naïve Bayes algorithm, Decision Tree algorithm and Support Vector Machine algorithm has been used to prevent the spam attack, as well as the phishing attack. …”
    Get full text
    Get full text
    Get full text
    Undergraduates Project Papers
  6. 6

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
    Get full text
    Get full text
    Thesis
  7. 7

    Amtree Protocol Enhancement by Multicast Tree Modification and Incorporation of Multiple Sources by Al‐Sharafi, Ali Mohammed Ali

    Published 2008
    “…This process takes a long time and the number of messages sent is at least equal to the number of cores in the tree. …”
    Get full text
    Get full text
    Thesis
  8. 8

    An efficient scalable batch-rekeying scheme for secure multicast communication using multiple logical key trees by Zakaria, Omar, Hassan Abdalla Hashim, Aisha, Hassan, Wan Haslina

    Published 2014
    “…In this paper, a new scheme based on multiple key trees is proposed. Instead of using only a single key tree multiple key trees are used and at the end of each batch time the algorithm decides which tree will be used to update the keys. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Indoor parking location information through Short Message Service (SMS) / Nurul Hidayu Abdul Aziz by Abdul Aziz, Nurul Hidayu

    Published 2010
    “…Sequential search algorithm will be use to do searching of the license plate. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Automatic generation of content security policy to mitigate cross site scripting by Mhana, Samer Attallah, Din, Jamilah, Atan, Rodziah

    Published 2016
    “…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    Cyberbullying detection: a machine learning approach by Yeong, Su Yen

    Published 2022
    “…Bag of Words model was used to convert text into numerical inputs. The machine learning algorithm, Support Vector Machine was chosen after comparing it with other algorithms such as Multinomial Naïve Bayes, Decision Tree Classifier, and Random Forest Classifier. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  12. 12

    A stylometry approach for blind linguistic steganalysis model against translation-based steganography by Mohd Lokman, Syiham

    Published 2023
    “…While targeted steganalysis is designed to attack a specific embedding algorithm, blind steganalysis use features extracted or selection from the medium to detect any anomalies that indicate a possibility that a secret data has been embedded within the medium. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde by Ogunfolajin Maruff , Tunde

    Published 2022
    “…This thesis is based on the application of sentiment classification algorithm to tweet data with the goal of classifying messages based on the polarity of sentiment towards a particular topic (or subject matter). …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system by Beg, Abul Hashem

    Published 2011
    “…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Enhancing a cluster-based TDMA MAC protocol for vehicle-to-vehicle communications / Abubakar Bello Tambawal by Abubakar Bello , Tambawal

    Published 2020
    “…A dynamic time slot allocation strategy using a binary tree algorithm has been proposed to prevent vehicles from the adjacent clusters to reserve the same time slot. …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    Named entity recognition using a new fuzzy support vector machine. by Mansouri, Alireza, Affendy, Lilly Suriani, Mamat, Ali

    Published 2008
    “…Some of the Machine learning algorithms used in NER methods are, support vector machine(SVM), Hidden Markov Model, Maximum Entropy Model (MEM) and Decision Tree. …”
    Get full text
    Get full text
    Article
  17. 17

    Challenges of hidden data in the unused area two within executable files by Naji, Ahmed Wathik, Zaidan, A.A., Zaidan, B.B.

    Published 2009
    “…Results: The programs were coded in Java computer language and implemented on Pentium PC. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Energy-aware task scheduling for streaming applications on NoC-based MPSoCs by Abd Ishak, Suhaimi Abd Ishak, Wu, Hui, Tariq, Umair Ullah

    Published 2024
    “…Our approach is supported by a set of novel techniques, which include constructing an initial schedule based on a list scheduling where the priority of each task is its approximate successor-tree-consistent deadline such that the workload across all the processors is balanced, a retiming heuristic to transform intraperiod dependencies into inter-period dependencies for enhancing parallelism, assigning an optimal discrete frequency for each task and each message using a Non-Linear Programming (NLP)-based algorithm and an Integer-Linear Programming (ILP)-based algorithm, and an incremental approach to reduce the memory usage of the retimed schedule in case of memory size violations. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Development of a Reliable Multicast Protocol in Mobile Ad Hoc Networks by Alahdal, Tariq A. A.

    Published 2008
    “…The approaches were tested using detailed discrete-event simulation model which was developed encompassing messaging system that includes error, delay and mobility models to characterize the performance benefits of the proposed algorithms in comparison to ReMHoc protocol. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Fuzzy-based multi-agent approach for reliability assessment and improvement of power system protection by Nadheer Abdulridha, Shalash

    Published 2015
    “…Meanwhile, the second MAS model has been designed using two agents as follows: the first agent is a fault current agent that is to determine the fault current at all points before and after grounding; the second agent is the time operating of the agent which is used to determine the relay operating time before and after modifying fault current. The simulation results for the first and second models are done using the data obtained from Malaysia distribution network (DISCO-Net) and 69 bus test system that were implemented using Java Agent Development Framework package software. …”
    Get full text
    Get full text
    Thesis