Search Results - (( java pattern classification algorithm ) OR ( using internet tree algorithm ))
Search alternatives:
- pattern classification »
- using internet »
- tree algorithm »
- internet tree »
- java »
-
1
An ensemble learning method for spam email detection system based on metaheuristic algorithms
Published 2015“…Recently, various techniques based on different algorithms have been developed. However, the classification accuracy and computational cost are not satisfied. …”
Get full text
Get full text
Thesis -
2
A novel steganography algorithm using edge detection and MPC algorithm
Published 2019“…Next, a full tree is constructed per group using the LSBs of its pixels. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
3
Algorithm for the legal regulation of internet financial crime
Published 2024“…Data processing for criminal acts on Internet finance platforms is crucial, with the utilization of random forest algorithms, including Decision tree and Bagging integration algorithms. …”
Get full text
Get full text
Get full text
Article -
4
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Electing the best set of features will help to improve the classifier predictions in terms of the normal and abnormal pattern. The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. …”
Get full text
Get full text
Thesis -
5
QoS Forwarding on the Optical Internet Backbone Area Using R-IWDMTC Protocol
Published 2006“…Discrete event simulator called OMNeT++ is used for modelling and analysis purposes and model of optical internet backbone area has been developed. …”
Get full text
Get full text
Conference or Workshop Item -
6
Dynamic tree-splitting algorithm for massive random access of M2M communications in IoT networks
Published 2021“…In this article, we introduce a dynamic tree-splitting (DTS) algorithm to resolve RACH collisions for delay-sensitive devices during burst arrival scenarios. …”
Get full text
Get full text
Get full text
Article -
7
Algorithm Development of Bidirectional Agglomerative Hierarchical Clustering Using AVL Tree with Visualization
Published 2024thesis::doctoral thesis -
8
E2IDS: an enhanced intelligent intrusion detection system based on decision tree algorithm
Published 2022“…The model design is Decision Tree (DT) algorithm-based, with an approach to data balancing since the data set used is highly unbalanced and one more approach for feature selection. …”
Get full text
Get full text
Article -
9
-
10
Phishing attack detection using machine learning method
Published 2019“…The Naïve Bayes algorithm, Decision Tree algorithm and Support Vector Machine algorithm has been used to prevent the spam attack, as well as the phishing attack. …”
Get full text
Get full text
Get full text
Undergraduates Project Papers -
11
Predicting Mental Health Disorder On Twitter Using Machine Learning Techniques
Published 2022“…Therefore, it is possible to analyze human behaviour using internet media. However, the illness of mental disorder is common yet often ignored. …”
Get full text
Get full text
Undergraduates Project Papers -
12
Intersection Features For Android Botnet Classification
Published 2019“…The Chi Square was used to select the most significant permissions, then the classification algorithms like Naïve Bayes and Decision Tree were used to classify the Android apps as botnet or benign apps. …”
Get full text
Get full text
Get full text
Article -
13
-
14
Internet of Things (IoT) intrusion detection by Machine Learning (ML): a review
Published 2023“…For example, it could be used to keep an eye on and regulate industrial services, or it could be used to improve corporate operations. …”
Get full text
Get full text
Get full text
Article -
15
-
16
Implementation of Health Monitoring System for Patients using Machine Learning Algorithms
Published 2024“…We employed the Decision Tree Algorithm to train and assess a model that produced a perfection of 66.66%.…”
Get full text
Get full text
Get full text
Get full text
Article -
17
-
18
Centralized scheduling, routing tree in WiMAX mesh networks
Published 2008Get full text
Get full text
Conference or Workshop Item -
19
Review and analysis of risk factor of maternal health in remote area using the Internet of Things (IoT)
Published 2020Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
20
Interference avoidance routing and scheduling using multiple transceivers for IEEE 802.16 mesh network
Published 2010“…This thesis presents an Energy/bit Minimization routing and centralized scheduling algorithms (EbMR-CS) using multi-transceiver and multi-channel for IEEE 802.16-2004 mesh networks. …”
Get full text
Get full text
Thesis
