Search Results - (( _ applications security algorithm ) OR ( based application mining algorithm ))
Search alternatives:
- application mining »
- based application »
- mining algorithm »
-
1
A comprehensive analysis of blockchain-based cryptocurrency mining impact on energy consumption
Published 2022“…The Proof-of-Work (PoW) algorithm is used for mining ‘Bitcoin’ which is consumed enormous computational power. …”
Get full text
Get full text
Get full text
Article -
2
Improving intrusion detection using genetic algorithm
Published 2013Get full text
Get full text
Get full text
Article -
3
-
4
-
5
Enhanced AI-based anomaly detection method in the intrusion detection system (IDS) / Kayvan Atefi
Published 2019“…Despite attempts to solve the data clustering issues, there are also many variants of modified algorithms in traditional information clustering that attempt to solve issues such as clustering algorithms based on condensation. …”
Get full text
Get full text
Thesis -
6
Unsupervised Anomaly Detection with Unlabeled Data Using Clustering
Published 2005Get full text
Get full text
Conference or Workshop Item -
7
-
8
Intelligent transmission line fault diagnosis using the Apriori associated rule algorithm under cloud computing environment
Published 2024“…The leakage fault cases verify the algorithm�s applicability and complete the correlation diagnosis of water wall leakage fault. …”
Article -
9
Systematic review on ai-blockchain based e-healthcare records management systems
Published 2022“…The performance of AI algorithms is enhanced through the data obtained from a data repository or a reliable, secure, trustworthy, and credible platform. …”
Get full text
Get full text
Get full text
Article -
10
Systematic review on ai-blockchain based e-healthcare records management systems
Published 2022“…The performance of AI algorithms is enhanced through the data obtained from a data repository or a reliable, secure, trustworthy, and credible platform. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
11
Profiling network traffic of Sultan Idris Shah building (BSIS) using data mining technique / Rusmawati Ishak
Published 2018“…Hence, in order to make it reliable to provide good online services, we need to identify what kind of application, characteristic trend and behaviour of BSIS users in network infrastructure. …”
Get full text
Get full text
Thesis -
12
Development of a Web Access Control Technique Based User Access Behavior
Published 2004“…Previous studies have not yet designed such a system that is reliable enough for such critical applications. This thesis discusses about designs and develops techniques and algorithms for performing web access control. …”
Get full text
Get full text
Thesis -
13
Improved Malware detection model with Apriori Association rule and particle swarm optimization
Published 2019“…In order to improve the detection rate of malicious application on the Android platform, a novel knowledge-based database discovery model that improves apriori association rule mining of a priori algorithm with Particle Swarm Optimization (PSO) is proposed. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
14
Named entity recognition using a new fuzzy support vector machine.
Published 2008“…Nowadays more researchers use three type of approaches namely, Rule-base NER, Machine Learning-base NER and Hybrid NER to identify names. …”
Get full text
Get full text
Article -
15
Sentiment Analysis of Cyberbullying in Social Media Using Decision Trees
Published 2020Get full text
Get full text
Final Year Project -
16
A framework for malware identification based on behavior
Published 2012Get full text
Get full text
Thesis -
17
-
18
Modifying iEclat algorithm for infrequent patterns mining
Published 2018“…This paper proposes an enhancement algorithm based on iEclat algorithms for mining infrequent pattern.…”
Get full text
Get full text
Conference or Workshop Item -
19
A hybrid approach to improve recommendation system in E-tourism
Published 2024conference output::conference proceedings::conference paper -
20
Efficient prime-based method for interactive mining of frequent patterns.
Published 2011“…Since rerunning mining algorithms from scratch is very costly and time-consuming, researchers have introduced interactive mining of frequent patterns. …”
Get full text
Get full text
Article
