Search Results - (( _ application mining algorithm ) OR ( some application ((rsa algorithm) OR (tree algorithm)) ))

Refine Results
  1. 1
  2. 2
  3. 3

    Algorithm comparison for data mining classification: assessing bank customer credit scoring default risk by Elaf Adel Abbas, Nisreen Abbas Hussein

    Published 2024
    “…Despite advances in machine learning models for credit assessment, unbalanced datasets and some algorithms’ failure to explain forecasts remain major issues. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4
  5. 5
  6. 6

    Classification of cervical cancer using random forest by Bahirah, Mohd Bashah, Ku Muhammad Naim, Ku Khalif, Nor Azuana, Ramli

    Published 2022
    “…In this research, the cervical cancer risk classification model was used by using data mining approach which consider Decision Tree and Random Forest algorithm. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    Class binarization with self-adaptive algorithm to improve human activity recognition by Zainudin, Muhammad Noorazlan Shah

    Published 2018
    “…Therefore, feature selection using Relief-f with self-adaptive Differential Evolution (rsaDE) algorithm is proposed to select the most significant features. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Classification models for higher learning scholarship award decisions by Wirawati Dewi Ahmad, Azuraliza Abu Bakar

    Published 2018
    “…Five algorithms were employed to develop a classification model in determining the award of the scholarship, namely J48, SVM, NB, ANN and RT algorithms. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9
  10. 10

    A novel ensemble decision tree-based CHi-squared Automatic Interaction Detection (CHAID) and multivariate logistic regression models in landslide susceptibility mapping by Althuwaynee, Omar F., Pradhan, Biswajeet, Park, Hyuck Jin, Lee, Jung Hyun

    Published 2014
    “…An ensemble algorithm of data mining decision tree (DT)-based CHi-squared Automatic Interaction Detection (CHAID) is widely used for prediction analysis in variety of applications. …”
    Get full text
    Get full text
    Article
  11. 11

    Security issues of Novel RSA variant by Nitaj, Abderrahmane, Kamel Ariffin, Muhammad Rezal, Adenan, Nurul Nur Hanisah, Lau, Terry Shue Chien, Che, Jiahui

    Published 2022
    “…The RSA is one of the current default cryptosystems that provides security with applications such as encryptions and digital signatures. …”
    Get full text
    Get full text
    Article
  12. 12

    Comparison between RSA hardware and software implementation for WSNs sexcurity schemes by Md. Tap, Abu Osman, Manttoro, Teddy, Alkalbani, Abdullah Said

    Published 2010
    “…In this study we compare the time complexity and power consumption between software and hardware implementation using RSA algorithm. Our simulation shows that usage of hardware security could improve time efficiency and decrease the power consumption, so the strong cryptography can be implemented in WSNs security.…”
    Get full text
    Get full text
    Proceeding Paper
  13. 13
  14. 14

    Named entity recognition using a new fuzzy support vector machine. by Mansouri, Alireza, Affendy, Lilly Suriani, Mamat, Ali

    Published 2008
    “…Some of the Machine learning algorithms used in NER methods are, support vector machine(SVM), Hidden Markov Model, Maximum Entropy Model (MEM) and Decision Tree. …”
    Get full text
    Get full text
    Article
  15. 15

    Small Dataset Learning In Prediction Model Using Box-Whisker Data Transformation by Lateh, Masitah bdul

    Published 2020
    “…To test the effectiveness of the proposed algorithm, the real and generated samples is added to training phase to build a prediction model using M5 Model Tree. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17
  18. 18

    Text encryption using Elliptic Curve Cryptography (ECC) over binary finite field and Elgamal Cryptosyste / Ahmad Asif Bakhtiar Noor Noor Hamid, Nor Syazwani Nor Zailan and Syaza Fa... by Noor Hamid, Ahmad Asif Bakhtiar Noor, Nor Zailan, Nor Syazwani, Ishak, Syaza Farlisa

    Published 2019
    “…Cryptography consists of some algorithms but the most common algorithms that had been used are Elliptic Curve Cyptography (ECC) and Rivest-Shamir-Adleman (RSA). …”
    Get full text
    Get full text
    Student Project
  19. 19
  20. 20

    Modifying iEclat algorithm for infrequent patterns mining by Julaily Aida, J., Mustafa, M.

    Published 2018
    “…This paper proposes an enhancement algorithm based on iEclat algorithms for mining infrequent pattern.…”
    Get full text
    Get full text
    Conference or Workshop Item