Search Results - (( security classification rules algorithm ) OR ( java application testing algorithm ))
Search alternatives:
- security classification »
- classification rules »
- application testing »
- testing algorithm »
- java application »
- rules algorithm »
-
1
An analysis of intrusion detection classification using supervised machine learning algorithms on NSL-KDD dataset / Sarthak Rastogi ... [et al.]
Published 2022“…Conventional IDS are less accurate in detecting anomalies because of the decision taking based on rules. The IDS with machine learning method improves the detection accuracy of the security attacks. …”
Get full text
Get full text
Get full text
Article -
2
-
3
A framework for malware identification based on behavior
Published 2012“…The IF-THEN Prediction Rules which is generated using the data mining technique, ID3 Algorithm is used. …”
Get full text
Get full text
Thesis -
4
-
5
Fusion of license plate and face recognition for secure parking / Siti Salwa Md Noor
Published 2013“…The accuracy rate attained is based on implementation of decision fusion using AND rule during classification. Experiments attained a total success rate (TSR) of 96% during parking based on plate recognition only and over 99% TSR during exit based on fusion of plate and face recognition at PSR value of 10. …”
Get full text
Get full text
Thesis -
6
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
7
A collision resistant cryptographic hash function based on cellular automata rules
Published 2013“…The framework divides requirements for the design of hash function into three classifications namely design requirements, security requirements for Boolean function and analysis requirements. …”
Get full text
Get full text
Thesis -
8
An Enhanced Ant Colony Optimisation Algorithm with the Hellinger Distance for Shariah-Compliant Securities Companies Bankruptcy Prediction
Published 2024“…Although the number of rules and conditions is not statistically significant, HD-AntMiner emerges as a robust algorithm for enhancing classification accuracy in imbalanced datasets, particularly in the context of Shariah-compliant securities prediction.…”
Get full text
Get full text
Get full text
Get full text
Article -
9
Android malware detection using PMCC heatmap and Fuzzy Unordered Rule Induction Algorithm (FURIA)
Published 2023“…For machine learning classification algorithms, we used a type of fuzzy logic called lattice reasoning. …”
Get full text
Get full text
Get full text
Article -
10
Named entity recognition using a new fuzzy support vector machine.
Published 2008Get full text
Get full text
Article -
11
Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application
Published 2020“…Performance Testing is used to test the performance of algorithm implementations in applications. …”
Get full text
Get full text
Journal -
12
A new integrated approach for evaluating sustainable development in the electric vehicle sector
Published 2025“…Third, this study uses the classification & regression tree (CART), random forest, and eXtreme gradient boosting (XGBoost) algorithms to assist managers in identifying the key predictive variables for further classification and prediction. …”
Get full text
Get full text
Get full text
Get full text
Article -
13
-
14
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…The concept of ABS algorithm was firstly studied, including the definition, historical background, and a brief comparison was made between the ABS algorithm with other types of algorithm. …”
Get full text
Get full text
Undergraduates Project Papers -
15
Classification System for Heart Disease Using Bayesian Classifier
Published 2007“…This system was developing base on to three main part which is data processing, testing and implementation of the algorithm. In this system a Bayesian algorithm was used in order to implement the system. …”
Get full text
Get full text
Thesis -
16
-
17
-
18
Encrypted mobile messaging application using AES block cipher cryptography algorithm / Nur Rasyiqah Zulkifli
Published 2019“…The programming language that is used to write the program is Java Language that will run on android phones. As the result, this project was tested on the functionality of the mobile messaging application. …”
Get full text
Get full text
Student Project -
19
Design Of Robot Motion Planning Algorithm For Wall Following Robot
Published 2006Get full text
Get full text
Monograph -
20
Security Analysis Between Static And Dynamic S-boxes In Block Ciphers
Published 2024Get full text
Article
