Search Results - (( java implementation tree algorithm ) OR ( program integration detection algorithm ))
Search alternatives:
- integration detection »
- java implementation »
- implementation tree »
- tree algorithm »
-
1
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
Get full text
Get full text
Get full text
Article -
2
Early autism spectrum disorder detection using machine learning / Muhammad Shahmi Shahron Nizan
Published 2023“…The project follows a modified waterfall approach, focusing on creating a user-friendly interface and integrating the Random Forest Classification Algorithm for accurate detection. …”
Get full text
Get full text
Thesis -
3
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
Get full text
Get full text
Get full text
Thesis -
4
An optimal mesh algorithm for remote protein homology detection
Published 2011“…This paper further presents the best combinations of multiple alignment and classification programs to be chosen. This paper also improves the quality of the multiple alignments via integration of a refinement algorithm. …”
Get full text
Get full text
Article -
5
Fault detection with optimum March Test Algorithm
Published 2012“…Therefore to improve fault detection, an automation program is developed based on sequence operation (SQ) generation rules. …”
Get full text
Conference or Workshop Item -
6
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…This study proposes a car parking management system which applies Dijkstra’s algorithm, Ant Colony Optimization (ACO) and Binary Search Tree (BST) in structuring a guidance system for indoor parking. …”
Get full text
Get full text
Thesis -
7
AI recommendation penetration testing tool for cross-site scripting: support vector machine algorithm
Published 2025“…This research introduces a new approach to enhancing cybersecurity by integrating Support Vector Machine (SVM) algorithms with penetration testing to develop a recommendation system focused on Cross-Site Scripting (XSS) attack detection. …”
Get full text
Get full text
Get full text
Article -
8
-
9
Forward-Backward Time Stepping with Automated Edge-preserving Regularization Technique for Wood Defects Detection
Published 2019“…Therefore, two automated procedures are developed to determine these parameters iteratively. The FBTS integrated with automated edge-preserving regularization algorithm is implemented in C++ programming language executed in parallel computing. …”
Get full text
Get full text
Thesis -
10
An Analysis Of System Calls Using J48 And JRip For Malware Detection
Published 2018“…The evolution of malware possesses serious threat ever since the concept of malware took root in the technology industry.The malicious software which is specifically designed to disrupt,damage,or gain authorized access to a computer system has made a lot of researchers try to develop a new and better technique to detect malware but it is still inaccurate in distinguishing the malware activities and ineffective.To solve the problem,this paper proposed the integrated machine learning methods consist of J48 and JRip in detecting the malware accurately.The integrated classifier algorithm applied to examine,classify and generate rules of the pattern and program behaviour of system call information.The outcome then revealed the integrated classifier of J48 and JRip outperforming the other classifier with 100% detection of attack rate. …”
Get full text
Get full text
Get full text
Article -
11
An Analysis Of System Calls Using J48 And JRip For Malware Detection
Published 2018“…The integrated classifier algorithm applied to examine, classify and generate rules of the pattern and program behaviour of system call information. …”
Get full text
Get full text
Get full text
Article -
12
-
13
-
14
Scrutinized System Calls Information Using J48 And Jrip For Malware Behaviour Detection
Published 2019“…This integrated classifier algorithm applied to analyse, classify and generate rules of the pattern and program behaviour of system call information in which, the legal and illegal behaviours could identify. …”
Get full text
Get full text
Get full text
Article -
15
-
16
Obstacles Avoidance Mobile Robot
Published 2007“…The challenge is to integrate this algorithm with some hardware configuration in order to complete the project.…”
Get full text
Get full text
Final Year Project -
17
Coordinated Malware Eradication And Remediation Project (CMERP)
Published 2019“…This integrated classifier algorithm applied to analyse, classify and generate rules of the pattern and program behaviour of system call information in which the legal and illegal behaviours could identified. …”
Get full text
Get full text
Get full text
Technical Report -
18
-
19
Image classification using two dimensional wavelet coefficients with parallel computing
Published 2020“…Furthermore, colour threshold analysis and edge detection algorithms are redesigned exclusively to refine the two-dimensional coefficients into a more meaningful low-level representation. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
20
A low cost and portable microwave imaging system for breast tumor detection
Published 2017“…The signal loss data will be gathered and will be integrated with breast cancer imaging algorithms.…”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD
