Search Results - (( tree detection using algorithm ) OR ( java based optimization algorithm ))
Search alternatives:
-
1
Outlier detection in circular regression model using minimum spanning tree method
Published 2019“…Therefore, this study aims to develop new algorithms that can detect outliers by using the minimum spanning tree method. …”
Get full text
Get full text
Conference or Workshop Item -
2
Novel approach for IP-PBX denial of service intrusion detection using support vector machine algorithm
Published 2021“…For CICIDS dataset, SVM algorithm achieved highest detection rate of 76.47% while decision tree and Naïve Bayes has 63.71% & 41.58% of detection rate, respectively. …”
Get full text
Get full text
Get full text
Get full text
Article -
3
A novel steganography algorithm using edge detection and MPC algorithm
Published 2019“…Next, a full tree is constructed per group using the LSBs of its pixels. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
4
Detecting Remote-To-Local (R2L) attack using Decision Tree algorithm / Ahmad Nasreen Aqmal Mohd Nordin
Published 2024“…The "Remote to Local (R2L) Intrusion Detection System Using Decision Tree" project aims to address the escalating threat of network intrusions by developing an effective intrusion detection system. …”
Get full text
Get full text
Thesis -
5
Optimization of blood vessel detection in retina images using multithreading and native code for portable devices
Published 2013“…The optimization of a computationally intensive algorithm such as this on a mobile platform is challenging due to the limited resources available. …”
Get full text
Get full text
Conference or Workshop Item -
6
Automatic Number Plate Recognition on android platform: With some Java code excerpts
Published 2016“…Hence, the objective of this research is to propose suitable and optimize algorithm for ANPR system on Android mobile phone. …”
Get full text
Get full text
Get full text
Book -
7
Comparison of malware detection model using supervised machine learning algorithms / Syamir Mohd Shahirudin
Published 2022“…The objective of this project is to develop the Windows malware detection model using supervised machine learning in Decision Tree, K-NN and Naïve Bayes, to evaluate the performance of malware detection in term of testing and training of the features selection and to compare the accuracy detection model in all three machine learning algorithms. …”
Get full text
Get full text
Student Project -
8
-
9
Attribute reduction based scheduling algorithm with enhanced hybrid genetic algorithm and particle swarm optimization for optimal device selection
Published 2022“…Therefore, in this paper, we proposed Dynamic tasks scheduling algorithm based on attribute reduction with an enhanced hybrid Genetic Algorithm and Particle Swarm Optimization for optimal device selection. …”
Get full text
Get full text
Article -
10
The effect of different distance measures in detecting outliers using clustering-based algorithm for circular regression model
Published 2017“…Here, we introduce the similarity distance based on Euclidean distance for circular model and obtain a cluster tree using the single linkage clustering algorithm. …”
Get full text
Get full text
Get full text
Article -
11
Semi-automatic oil palm tree counting from pleiades satellite imagery and airborne LiDAR / Nurul Syafiqah Khalid
Published 2020“…This study aimed to develop the automatic oil palm tree counting using remote sensed data and two different algorithms at Felda Pasoh. …”
Get full text
Get full text
Thesis -
12
Breast cancer disease classification using fuzzy-ID3 algorithm with FUZZYDBD method: automatic fuzzy database definition
Published 2021“…This paper proposed the fuzzy-ID3 (FID3) algorithm, a fuzzy decision tree as the classification method in breast cancer detection. …”
Get full text
Get full text
Get full text
Get full text
Article -
13
Detection and classification of conflict flows in SDN using machine learning algorithms
Published 2021“…As a result, this paper presents several machine learning algorithms that include Decision Tree (DT), Support Vector Machine (SVM), Extremely Fast Decision Tree (EFDT) and Hybrid (DT-SVM) for detecting and classifying conflicting flows in SDNs. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
14
Comparison of supervised machine learning algorithms for malware detection / Mohd Faris Mohd Fuzi ... [et al.]
Published 2023“…Then, the percentage of detection accuracy was used to compare the detection performance of all five algorithms. …”
Get full text
Get full text
Get full text
Article -
15
Comparative study of clustering-based outliers detection methods in circular-circular regression model
Published 2021“…Three measures of similarity based on the circular distance were used to obtain a cluster tree using the agglomerative hierarchical methods. …”
Get full text
Get full text
Get full text
Article -
16
A lower complexity K best algorithm for multiple input and multiple output detection
Published 2011“…This paper presents Multiple Input Multiple Output (MIMO) detection steps using tree search based method known as the ‘K’ best algorithm. …”
Get full text
Get full text
Get full text
Article -
17
Comparative study of clustering-based outliers detection methods in circular-circular regression model
Published 2021“…Three measures of similarity based on the circular distance were used to obtain a cluster tree using the agglomerative hierarchical methods. …”
Get full text
Get full text
Get full text
Article -
18
Comparative study of clustering-based outliers detection methods in circularcircular regression model
Published 2021“…Three measures of similarity based on the circular distance were used to obtain a cluster tree using the agglomerative hierarchical methods. …”
Get full text
Get full text
Get full text
Article -
19
A lower complexity k best algorithm for multiple input and multiple output detection
Published 2011“…This paper presents Multiple Input Multiple Output (MIMO) detection steps using tree search based method known as the ‘K’ best algorithm. …”
Get full text
Get full text
Get full text
Get full text
Article -
20
Ant colony optimization algorithm for load balancing in grid computing
Published 2012“…The proposed algorithm is known as the enhance ant colony optimization (EACO). …”
Get full text
Get full text
Get full text
Monograph
