{"created":"2020-11-20T04:27:47.298060+00:00","id":6330,"links":{},"metadata":{"_buckets":{"deposit":"d8646849-4367-4d6e-86f8-4e17a9bcf267"},"_deposit":{"created_by":29,"id":"6330","owner":"29","owners":[29],"owners_ext":{"displayname":"","email":"myatwutyiwin@ucsm.edu.mm","username":""},"pid":{"revision_id":0,"type":"recid","value":"6330"},"status":"published"},"_oai":{"id":"oai:meral.edu.mm:recid/6330","sets":["1582963711870:1596615380824"]},"communities":["ucsm"],"item_1583103067471":{"attribute_name":"Title","attribute_value_mlt":[{"subitem_1551255647225":"An Analysis of Decision Tree Based Intrusion Detection System","subitem_1551255648112":"en"}]},"item_1583103085720":{"attribute_name":"Description","attribute_value_mlt":[{"interim":" "}]},"item_1583103120197":{"attribute_name":"Files","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_access","date":[{"dateType":"Available","dateValue":"2020-11-20"}],"displaytype":"preview","filename":"YiYiAung_Publication_P5.pdf","filesize":[{"value":"145 Kb"}],"format":"application/pdf","url":{"url":"https://meral.edu.mm/record/6330/files/YiYiAung_Publication_P5.pdf"},"version_id":"625277c5-5000-433c-81dd-0894adeed6a7"}]},"item_1583103147082":{"attribute_name":"Conference papers","attribute_value_mlt":[{"subitem_acronym":"ICAIT","subitem_c_date":"1st November, 2017","subitem_conference_title":"1st International Conference on Advanced Information Technologies","subitem_place":"Yangon, Myanmar"}]},"item_1583105942107":{"attribute_name":"Authors","attribute_value_mlt":[{"subitem_authors":[{"subitem_authors_fullname":"Yi Yi Aung"},{"subitem_authors_fullname":"Myat Myat Min"}]}]},"item_1583108359239":{"attribute_name":"Upload type","attribute_value_mlt":[{"interim":"Publication"}]},"item_1583108428133":{"attribute_name":"Publication type","attribute_value_mlt":[{"interim":"Conference paper"}]},"item_title":"An Analysis of Decision Tree Based Intrusion Detection System","item_type_id":"21","owner":"29","path":["1596615380824"],"publish_date":"2020-11-20","publish_status":"0","recid":"6330","relation_version_is_last":true,"title":["An Analysis of Decision Tree Based Intrusion Detection System"],"weko_creator_id":"29","weko_shared_id":-1},"updated":"2021-12-13T07:54:38.626715+00:00"}