Search Results - (( data integration between algorithm ) OR ( java implication based algorithm ))

Refine Results
  1. 1

    Integration Of Unsupervised Clustering Algorithm And Supervised Classifier For Pattern Recognition by Leong, Shi Xiang

    Published 2017
    “…Phase 1 is mainly to evaluate the performance of clustering algorithm (K-Means and FCM). Phase 2 is to study the performance of proposed integration system which using the data clustered to be used as train data for Naïve Bayes classifier. …”
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3

    Feature selection with integrated Gaussian seahorse optimization data mining for cross-border business cooperation between the Malaysian medical industry and tourism industry by Ma, Yuaner, Jabar, Juhaini, Abdul Aziz, Nor Azah

    Published 2023
    “…The integrated GSH-DM approach showcases the potential of combining feature selection techniques with advanced optimization algorithms in data mining applications. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Neural Network with Genetic Algorithm Prediction Model of Energy Consumption for Billing Integrity in Gas Pipeline by Hasbullah, Aidil Fazlina Binti

    Published 2012
    “…By monitoring and maintaining using metering system, the reliability and billing integrity can be ensured and trustworthy can be developed between distributors and customers. …”
    Get full text
    Get full text
    Final Year Project
  5. 5

    Automatic detection of lineaments from LANDSAT images in United Arab Emirate (UAE) by Marghany , Maged, El Mahdi, Samy Ismail, Hashim, Mazlan

    Published 2006
    “…Integration between Canny and edge detection algorithms illustrated highly accurate level within RMSE of ± 2 m.…”
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    Automated data process in participatory sensing using QR-code and EAN-13 barcode by Che Ya, Mohamad Fakhrul Syafiq

    Published 2018
    “…Both mechanism was used to maintain data integrity between the prices corresponding to the product. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Implementation of Station-To-Station (STS) protocol using Elliptic Curve Digital Signature Al Algorithm / Muhammad Faris Fakhri Rozi, Alya Syuhada Ismail and Emylia Suhaimi by Rozi, Muhammad Faris Fakhri, Ismail, Alya Syuhada, Suhaimi, Emylia

    Published 2018
    “…Elliptic Curve Digital Signature Algorithms (ECDSA) is implemented in Station-To¬ Station protocol in order to give an improvement in the secret key exchange between two parties. …”
    Get full text
    Get full text
    Student Project
  8. 8
  9. 9

    Secured route optimization in mobile IPv6 wireless networks in terms of data integrity by Mehdizadeh, Abbas, Khatun, Sabira, Mohd Ali, Borhanuddin, Raja Abdullah, Raja Syamsul Azmir, Kurup, Gopakumar

    Published 2008
    “…An enhanced security algorithm is developed on top of MIPv6 RO to secure data and prepare safe communication between MN and CN. …”
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10
  11. 11

    Enhancing security performance with parallel crypto operations in SSL bulk data transfer phase by Alaidaros, Hashem Mohammed, A. Rasid, Mohd Fadlee, Othman, Mohamed, Raja Abdullah, Raja Syamsul Azmir

    Published 2007
    “…The proposed algorithm performs the encryption of the data and the calculation of the MAC in parallel. …”
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12

    Improving security performance with parallel crypto operations in SSL bulk data transfer by Alaidaros, Hashem Mohammed, Othman, Mohamed, A. Rasid, Mohd Fadlee

    Published 2009
    “…The proposed algorithm performs the encryption of the data and the calculation of the MAC in parallel. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Meta-heuristics and deep learning for energy applications: Review and open research challenges (2018?2023) by Hosseini E., Al-Ghaili A.M., Kadir D.H., Gunasekaran S.S., Ahmed A.N., Jamil N., Deveci M., Razali R.A.

    Published 2025
    “…Conversely, meta-heuristic algorithms offer optimization capabilities but suffer from computational burdens, especially with high-dimensional data. …”
    Review
  14. 14

    Proposed system for data security in distributed computing in using triple data encryption standard and Rivest Shamir Adlemen by Shawkat S.A., Tuama B.A., Al-Barazanchi I.

    Published 2023
    “…This increases the security problems in security such as data confidentiality, data integrity and data availability, so the solution of such problems are conducted by adopting data encryption is very important for securing users data. …”
    Article
  15. 15

    Enhancing benthic habitat mapping: A review of integrating satellite and side scan sonar data for improved classification accuracy by Yeong, Wei Yi, Chong, Wei Sheng, Ching Hue, Imelus Nius

    Published 2024
    “…The integration of acoustically derived data and/or bathymetric data with satellite imagery can influence mapping results to varying degrees. …”
    Get full text
    Get full text
    Article
  16. 16

    Pembangunan model regresi poisson sifar-melambung berintegrasi dalam biostatistik by Zafakali, Nur Syabiha

    Published 2018
    “…The combination of these methods is referred to as the Integrated Model. The second phase is the comparison of the findings between the Integrated Model and the existing method. …”
    Get full text
    Get full text
    Thesis
  17. 17

    An Efficient IDS Using Hybrid Magnetic Swarm Optimization in WANETs by Sadiq, Ali Safaa, Alkazemi, Basem, Mirjalili, Seyedali, Ahmed, Noraziah, Khan, Suleman, Ali, Ihsan, Pathan, Al-Sakib Khan, Ghafoor, Kayhan Zrar

    Published 2018
    “…In order to improve the effectiveness of intrusion detection systems (IDSs), data analysis methods such as data mining and classification methods are often integrated with IDSs. …”
    Get full text
    Get full text
    Article
  18. 18

    An efficient IDS using hybrid Magnetic swarm optimization in WANETs by Sadiq, Ali Safa, Alkazemi, Basem Y., Mirjalili, Seyedali, Noraziah, Ahmad, Khan, Suleman, Ihsan, Ali, Pathan, Al-Sakib Khan, Ghafoor, Kayhan Zrar

    Published 2018
    “…In order to improve the effectiveness of intrusion detection systems (IDSs), data analysis methods such as data mining and classification methods are often integrated with IDSs. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  19. 19
  20. 20

    Replica Creation Algorithm for Data Grids by Madi, Mohammed Kamel

    Published 2012
    “…This thesis presents a new replication algorithm that improves data access performance in data grids by distributing relevant data copies around the grid. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis