Search Results - (( security classification rules algorithm ) OR ( java implementation phase algorithm ))
Search alternatives:
- security classification »
- classification rules »
- implementation phase »
- java implementation »
- rules algorithm »
- phase algorithm »
-
1
An analysis of intrusion detection classification using supervised machine learning algorithms on NSL-KDD dataset / Sarthak Rastogi ... [et al.]
Published 2022“…Conventional IDS are less accurate in detecting anomalies because of the decision taking based on rules. The IDS with machine learning method improves the detection accuracy of the security attacks. …”
Get full text
Get full text
Get full text
Article -
2
-
3
A framework for malware identification based on behavior
Published 2012“…The IF-THEN Prediction Rules which is generated using the data mining technique, ID3 Algorithm is used. …”
Get full text
Get full text
Thesis -
4
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…All the algorithm for the engine has been developed by using Java script language. …”
Get full text
Get full text
Thesis -
5
-
6
Fusion of license plate and face recognition for secure parking / Siti Salwa Md Noor
Published 2013“…The accuracy rate attained is based on implementation of decision fusion using AND rule during classification. Experiments attained a total success rate (TSR) of 96% during parking based on plate recognition only and over 99% TSR during exit based on fusion of plate and face recognition at PSR value of 10. …”
Get full text
Get full text
Thesis -
7
A collision resistant cryptographic hash function based on cellular automata rules
Published 2013“…The framework divides requirements for the design of hash function into three classifications namely design requirements, security requirements for Boolean function and analysis requirements. …”
Get full text
Get full text
Thesis -
8
An Enhanced Ant Colony Optimisation Algorithm with the Hellinger Distance for Shariah-Compliant Securities Companies Bankruptcy Prediction
Published 2024“…Although the number of rules and conditions is not statistically significant, HD-AntMiner emerges as a robust algorithm for enhancing classification accuracy in imbalanced datasets, particularly in the context of Shariah-compliant securities prediction.…”
Get full text
Get full text
Get full text
Get full text
Article -
9
Android malware detection using PMCC heatmap and Fuzzy Unordered Rule Induction Algorithm (FURIA)
Published 2023“…For machine learning classification algorithms, we used a type of fuzzy logic called lattice reasoning. …”
Get full text
Get full text
Get full text
Article -
10
Named entity recognition using a new fuzzy support vector machine.
Published 2008Get full text
Get full text
Article -
11
Optimal route checking using genetic algorithm for UiTM's bus services / Tengku Salman Fathi Tengku Jaafar
Published 2006“…Although from human logical thinking, the route can be generated easily but the calculation of checking the route whether it is optimal route or not is difficult and will take long time to be implemented. This research study with the development of the Optimal Route Checking Using Genetic Algorithm system should solve this scenario. …”
Get full text
Get full text
Thesis -
12
A new integrated approach for evaluating sustainable development in the electric vehicle sector
Published 2025“…Third, this study uses the classification & regression tree (CART), random forest, and eXtreme gradient boosting (XGBoost) algorithms to assist managers in identifying the key predictive variables for further classification and prediction. …”
Get full text
Get full text
Get full text
Get full text
Article -
13
Enhanced Adaptive Neuro-Fuzzy Inference System Classification Method for Intrusion Detection
Published 2024“…Additionally, standard deviation and proposed adaptive K-means algorithms have been employed to minimize the generated rules by ANFIS from the proposed hybrid models. …”
Get full text
Get full text
Get full text
Get full text
Thesis
