Search Results - (( model mitigating tree algorithm ) OR ( java application optimization algorithm ))

Refine Results
  1. 1

    Detecting Remote-To-Local (R2L) attack using Decision Tree algorithm / Ahmad Nasreen Aqmal Mohd Nordin by Mohd Nordin, Ahmad Nasreen Aqmal

    Published 2024
    “…The key results encompass dataset preprocessing, Decision Tree classification model training, user interface development, and the evaluation of the Decision Tree model's performance. …”
    Get full text
    Get full text
    Thesis
  2. 2

    A coalition model for efficient indexing in wireless sensor network with random mobility / Hazem Jihad Ali Badarneh by Hazem Jihad , Ali Badarneh

    Published 2021
    “…The proposed model consists of Dynamic-Coalition framework, Static-Coalition algorithm, and Coalition-Based Index-Tree framework. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    An optimized attack tree model for security test case planning and generation by Omotunde, Habeeb, Ibrahim, Rosziati, Ahmed, Maryam

    Published 2018
    “…This paper presents an attack tree modeling algorithm for deriving a minimal set of effective attack vectors required to test a web application for SQL injection vulnerabilities. …”
    Get full text
    Get full text
    Article
  4. 4
  5. 5

    Performance evaluation of real-time multiprocessor scheduling algorithms by Alhussian, H., Zakaria, N., Abdulkadir, S.J., Fageeri, S.O.

    Published 2016
    “…These results suggests that optimal algorithms may turn to be non-optimal when practically implemented, unlike USG which reveals far less scheduling overhead and hence could be practically implemented in real-world applications. …”
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6
  7. 7

    Route Optimization System by Zulkifli, Abdul Hayy

    Published 2005
    “…After much research into the many algorithms available, and considering some, including Genetic Algorithm (GA), the author selected Dijkstra's Algorithm (DA). …”
    Get full text
    Get full text
    Final Year Project
  8. 8
  9. 9

    Predicting building damage grade by earthquake: a Bayesian Optimization-based comparative study of machine learning algorithms by Al-Rawashdeh, Mohammad, Al Nawaiseh, Moh’d, Yousef, Isam, Bisharah, Majdi, Alkhadrawi, Sajeda, Al-Bdour, Hamza

    Published 2024
    “…With 89.39 test accuracy and 99.82 train accuracy, the Random Forest model performs well. The Decision Tree model has 89.19 test and 99.94 train accuracy. …”
    Get full text
    Get full text
    Article
  10. 10
  11. 11

    Household overspending model amongst B40, M40 and T20 using classification algorithm by Zulaiha Ali, Othman, Azuraliza, Abu Bakar, Nor Samsiah, Sani, Jamaludin, Sallim

    Published 2020
    “…The results show that the decision tree through J48 algorithm has produced the easiest rule to be interpreted. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    A novel peak shaving algorithm for islanded microgrid using battery energy storage system by Uddin, Moslem, Romlie, M.F., Abdullah, M.F., Tan, Chia Kwang, Shafiullah, G.M., Bakar, Ab Halim Abu

    Published 2020
    “…The objective of this study is to propose a decision-tree-based peak shaving algorithm for islanded microgrid. …”
    Get full text
    Get full text
    Article
  13. 13

    A novel peak shaving algorithm for islanded microgrid using battery energy storage system by Uddin, M., Romlie, M.F., Abdullah, M.F., Tan, C., Shafiullah, G.M., Bakar, A.H.A.

    Published 2020
    “…The objective of this study is to propose a decision-tree-based peak shaving algorithm for islanded microgrid. …”
    Get full text
    Get full text
    Article
  14. 14

    Application of Machine Learning for Daily Forecasting Dam Water Levels by Almubaidin, Ahmed, Winston C.A.A., El-Shajie A.

    Published 2024
    “…The bagged tree model achieved an RMSE of 0.13953, taking less than 10 seconds to train. …”
    Article
  15. 15
  16. 16
  17. 17

    An empirical study of pattern leakage impact during data preprocessing on machine learning-based intrusion detection models reliability by Bouke, Mohamed Aly, Abdullah, Azizol

    Published 2023
    “…To address this problem, we provide suggestions for mitigating data leakage in the training process and analyzing the sensitivity of different algorithms. …”
    Get full text
    Get full text
    Article
  18. 18

    Computer Lab Timetabling Using Genetic Algorithm Case Study - Unit ICT by Abdullah, Amran

    Published 2006
    “…Genetic Algorithm is one of the most popular optimization solutions used in various applications such as scheduling. …”
    Get full text
    Get full text
    Thesis
  19. 19

    XAIRF-WFP: a novel XAI-based random forest classifier for advanced email spam detection by Bouke, Mohamed Aly, Alramli, Omar Imhemed, Abdullah, Azizol

    Published 2024
    “…Traditional machine learning algorithms such as Logistic Regression (LR), K-Nearest Neighbors (KNN), Decision Trees (DT), and Support Vector Machines (SVM) have been employed to mitigate this challenge. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20