Search Results - (( java implication rsa algorithm ) OR ( towards implementation tree algorithm ))
Search alternatives:
- towards implementation »
- implementation tree »
- java implication »
- implication rsa »
- tree algorithm »
- rsa algorithm »
-
1
Detecting Remote-To-Local (R2L) attack using Decision Tree algorithm / Ahmad Nasreen Aqmal Mohd Nordin
Published 2024“…The system design phase encompasses the development of system architecture, flowcharts, pseudocode, and interface design. The implementation phase focuses on the deployment of the Decision Tree algorithm and system evaluation through functionality testing. …”
Get full text
Get full text
Thesis -
2
Network instrusion prevention system ( NIPS) based on network intrusion detection system (NIDS) and ID3 algorithm decision tree classifier
Published 2011“…Network security has gained significant attention in research and industrial communities.Due to the increasing threat of the network intrusion,firewalls have become important elements of the security policy.Firewall performance highly depends toward number of rules,because the large more rules the consequence makes downhill performance progressively.Firewall can be allow or deny access network packets incoming and outgoing into Local Area Network(LAN),but firewall can not detect intrusion.To distinguishing an intrusion network packet or normal is very difficult and takes a lot of time.An analyst must review all the network traffics previously.In this study,a new way to make the rules that can determine network packet is intrusion or normal automatically.These rules implemented into firewall as prevention,which if there is a network packet that match these rules then network packet will be dropped.This is called Network Intrusion Prevention System(NIPS).These rules are generated based on Network Intrusion Detection System(NIDS)and Iterative Dichotomiser 3 (ID3)Algorithm Decision Tree Classifier,which as data training is intrusion network packet and normal network packets from previous network traffics.The experiment is successful,which can generate the rules then implemented into a firewall and drop the intrusion network packet automatically.Moreover,this way can minimize number of rules in firewall.…”
Get full text
Get full text
Thesis -
3
Photogrammetric unmanned aerial vehicle for digital terrain model estimation under oil palm tree canopy area / Suzanah Abdullah
Published 2021“…At this stage, this study has formulated a new methodology for estimating DTM production under tree canopy conditions based on tree crown estimation produced from the digital surface model (DSM) and subsequently, the tree height estimation was determined as the final process in the DTM implementation. …”
Get full text
Get full text
Thesis -
4
-
5
Optimizing tree planting areas through integer programming and improved genetic algorithm
Published 2012“…The simulation of planting lining design relative to possible solutions of dividing an area to blocks (block division) and selecting planting lining direction towards optimizing tree planting areas is a complex problem. …”
Get full text
Get full text
Thesis -
6
-
7
Machine learning in predicting anti-money laundering compliance with protection motivation theory among professional accountants
Published 2023“…The research elaborates on the design and implementation of machine learning models based on three algorithms: Decision Tree, Gradient Boosted Tree, and Support Vector Machine. …”
Get full text
Get full text
Article -
8
Robotic path planning using rapidly-exploring random trees
Published 2013“…This study concerns the implementation of Rapidly-Exploring Random Trees (RRTs) algorithm for an autonomous robot path planning. …”
Get full text
Get full text
Get full text
Thesis -
9
Students’ attitude towards video-based learning: machine learning analysis with rapid software / Abdullah Sani Abd Rahman ... [et al.]
Published 2022“…Three machine learning algorithms (Support Vector Machine, Random Forest, and Decision Tree) have been tested on the dataset in a rapid software platform. …”
Get full text
Get full text
Get full text
Article -
10
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…Four conventional classification algorithms: naïve bayes (NB), support vector machines (SVM), nearest neighbor (k-NN), and decision trees (J48) classifiers are implemented in identifying and categorizing tweet data of three political figures in Malaysia: Dato Seri Anwar, Dato Hadi Awang, and Lim Guang Eng, as either positive, negative, or neutral perceptions. …”
Get full text
Get full text
Get full text
Thesis -
11
An object-based approach to detect tree stumps in a selective logging area using Unmanned Aerial Vehicle imagery
Published 2021“…This research implemented a technique for detecting, segmenting, classifying, and measuring tree stumps by using the Multiresolution Segmentation Algorithm method. …”
Get full text
Get full text
Get full text
Article -
12
An Integrated Principal Component Analysis And Weighted Apriori-T Algorithm For Imbalanced Data Root Cause Analysis
Published 2016“…In conclusion, the proposed algorithm is able to overcome the rare item issue by implementing covariance based support value normalization and high computational costs issue by implementing indexing enumeration tree structure.Future work of this study should focus on rule interpretation to generate more human understandable rule by novice in data mining. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
13
Intelligent Computerised System Towards Implementing a Lining-Layout Optimisation Strategy
Published 2024conference output::conference proceedings::conference paper -
14
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…This study proposes a car parking management system which applies Dijkstra’s algorithm, Ant Colony Optimization (ACO) and Binary Search Tree (BST) in structuring a guidance system for indoor parking. …”
Get full text
Get full text
Thesis -
15
Frequent Lexicographic Algorithm for Mining Association Rules
Published 2005“…The algorithm involved the construction of the nodes of a lexicographic tree that represent frequent patterns. …”
Get full text
Get full text
Thesis -
16
Predicting Suicidal Ideation Via Social Media
Published 2023“…Three Machine Learning algorithms are implemented to predict the result and outcome which are Support Vector Machine (SVM), Decision Tree and Naive Bayes (NB). …”
Get full text
Get full text
Undergraduates Project Papers -
17
Comparison on machine learning algorithm to fast detection of malicious web pages
Published 2021“…Compared to several decision tree method, Random Forest has shown promising and higher sensitivity result towards malicious data which is 98.3% compared to other classification algorithm…”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
18
Prediction models of heritage building based on machine learning / Nur Shahirah Ja'afar
Published 2021“…To overcome these limitations, this research has proposed five machine learning algorithms namely Linear Regression, Lasso, Ridge, Random Forest and Decision Tree. …”
Get full text
Get full text
Thesis -
19
Design of Predictive Model for TCM Tongue Diagnosis In Malaysia Using Machine Learning
Published 2020“…Six supervised machine learning algorithms (Linear Regression, Logistic Regression, K Nearest Neighbors (KNN), Decision Trees (DT), Support Vector Machine (SVM) and Random Forest) are used to perform disease prediction. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
20
Ganoderma boninense classification based on near-infrared spectral data using machine learning techniques
Published 2022“…Four different ML algorithms are tested for prediction of G. boninense infection: K-Nearest Neighbour (kNN), Naïve Bayes (NB), Support Vector Machine (SVM) and Decision Tree (DT) are tested which depicted DT algorithm achieves a satisfactory overall performance with high accuracy up to 93.1% and F1-score of 92.6% compared to other algorithms. …”
Get full text
Get full text
Get full text
Article
