Search Results - (( its application tree algorithm ) OR ( its applications security algorithm ))
Search alternatives:
- application tree »
- its applications »
- its application »
- tree algorithm »
-
1
Cloud Worm Detection and Response Technique By Integrating The Enhanced Genetic Algorithm An Threat Level
Published 2024thesis::doctoral thesis -
2
A new mobile botnet classification based on permission and API calls
Published 2024Conference Paper -
3
Named entity recognition using a new fuzzy support vector machine.
Published 2008“…Machine learning method is more famous and applicable than others, because it’s more portable and domain independent. …”
Get full text
Get full text
Article -
4
-
5
-
6
IDS for Improving DDoS attack recognition based on attack profiles and network traffic features
Published 2020Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
7
A Scalable Algorithm for Constructing Frequent Pattern Tree
Published 2014Get full text
Get full text
Get full text
Article -
8
Laptop price prediction using decision tree algorithm / Nurnazifah Abd Mokti
Published 2024“…The project involves data collection, data preparation, and the implementation of the decision tree algorithm for price prediction. The decision tree's effectiveness and accuracy in predicting laptop prices are evaluated through rigorous testing and validation. …”
Get full text
Get full text
Thesis -
9
Machine learning-based enhanced deep packet inspection for IP packet priority classification with differentiated services code point for advance network management
Published 2024“…Similarly, DPI plays a crucial role in network management, enabling the identification of applications, services, and potential threats within the network traffic. …”
Get full text
Get full text
Get full text
Get full text
Article -
10
A class skew-insensitive ACO-based decision tree algorithm for imbalanced data sets
Published 2021“…Ant-tree-miner (ATM) has an advantage over the conventional decision tree algorithm in terms of feature selection. …”
Get full text
Get full text
Get full text
Article -
11
Selection, generation and extraction of MCCTree using XMCCTree
Published 2012Get full text
Get full text
Get full text
Article -
12
-
13
-
14
-
15
Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges
Published 2014“…Generally RSA algorithm gain a security support because of it’s frequently use in most applications where security of digital data is mostly a concern. …”
Get full text
Get full text
Get full text
Get full text
Article -
16
Parsing algorithms for grammars with regulated rewriting
Published 2011Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
17
Data Classification and Its Application in Credit Card Approval
Published 2004“…The result of this application using the sample credit card approval dataset includes a decision tree, a set of rules derived from the decision tree and its accuracy. …”
Get full text
Get full text
Final Year Project -
18
Photogrammetric unmanned aerial vehicle for digital terrain model estimation under oil palm tree canopy area / Suzanah Abdullah
Published 2021“…Following the application of a new methodology on the real site, the result indicated the consistency of DTM values of all the algorithms at different flying heights but there were relatively small differences between all the algorithms used. …”
Get full text
Get full text
Thesis -
19
Extended RECTANGLE Algorithm Using 3D Bit Rotation to Propose a New Lightweight Block Cipher for IoT
Published 2024journal::journal article -
20
