Search Results - (( programming security selection algorithm ) OR ( java application mining algorithm ))

  • Showing 1 - 20 results of 20
Refine Results
  1. 1
  2. 2
  3. 3

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Mining Sequential Patterns Using I-PrefixSpan by Dhany , Saputra, Rambli Dayang, R.A., Foong, Oi Mean

    Published 2007
    “…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    A web-based implementation of k-means algorithms by Lee, Quan

    Published 2022
    “…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  6. 6
  7. 7

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9

    AI recommendation penetration testing tools for password attacks: random forest by Rozman, Nurulasyiqin, Saad, Shahadan

    Published 2025
    “…This project developed an AI-based recommendation system using the Random Forest algorithm to address the complexities of selecting appropriate penetration testing tools for password attacks. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10
  11. 11
  12. 12

    Enhanced dynamic security assessment for power system under normal and fake tripping contingencies. by A. Salih, Qusay

    Published 2019
    “…The hybrid logistic model tree (hybrid LMT) approach proposed in this study combines the symmetrical uncertainties (SU) algorithm and the logistic model tree (LMT) algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14

    Database encryption for a Web-based Claims System by Syed Zulkarnain Syed Idrus

    Published 2008
    “…This system can also be equipped with a security tool to prevent hackers or unauthorised persons, which can be selected from the results of the security analysis. …”
    Get full text
    Thesis
  15. 15
  16. 16

    Modified firefly algorithm for directional overcurrent relay coordination in power system protection / Muhamad Hatta Hussain by Hussain, Muhamad Hatta

    Published 2020
    “…They can utilize the results for the setting, type and coordination protective device to ensure reliable design in terms of security, selectivity, stability and speed.…”
    Get full text
    Get full text
    Thesis
  17. 17

    A multi-filter feature selection in detecting distributed denial-of-service attack by Yon, Yi Jun, Leau, Yu-Beng, Suraya Alias, Park, Yong Jin

    Published 2019
    “…It consists of 3-stage procedures: feature ranking, feature selection and classification. Subsequently, an experimental evaluation of the proposed Multi-Filter Feature Selection (M2FS) method is performed by using the benchmark dataset, NSL-KDD and employed the J48 classification algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18

    An ensemble deep learning classifier stacked with fuzzy ARTMAP for malware detection by Shing, Chiang Tan, Mohammed Al-Andoli, Mohammed Nasser, Kok, Swee Lim, Pey, Yun Goh, Chee, Peng Lim

    Published 2023
    “…FAM is selected as a meta-learner to effectively train and combine the outputs of the base learners and achieve robust and accurate classification. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19
  20. 20