Search Results - (( data integration between algorithm ) OR ( java implication based algorithm ))
Search alternatives:
- integration between »
- between algorithm »
- implication based »
- data integration »
- java implication »
-
1
Integration Of Unsupervised Clustering Algorithm And Supervised Classifier For Pattern Recognition
Published 2017“…Phase 1 is mainly to evaluate the performance of clustering algorithm (K-Means and FCM). Phase 2 is to study the performance of proposed integration system which using the data clustered to be used as train data for Naïve Bayes classifier. …”
Get full text
Get full text
Thesis -
2
-
3
Feature selection with integrated Gaussian seahorse optimization data mining for cross-border business cooperation between the Malaysian medical industry and tourism industry
Published 2023“…The integrated GSH-DM approach showcases the potential of combining feature selection techniques with advanced optimization algorithms in data mining applications. …”
Get full text
Get full text
Get full text
Article -
4
Neural Network with Genetic Algorithm Prediction Model of Energy Consumption for Billing Integrity in Gas Pipeline
Published 2012“…By monitoring and maintaining using metering system, the reliability and billing integrity can be ensured and trustworthy can be developed between distributors and customers. …”
Get full text
Get full text
Final Year Project -
5
Automatic detection of lineaments from LANDSAT images in United Arab Emirate (UAE)
Published 2006“…Integration between Canny and edge detection algorithms illustrated highly accurate level within RMSE of ± 2 m.…”
Get full text
Get full text
Conference or Workshop Item -
6
Automated data process in participatory sensing using QR-code and EAN-13 barcode
Published 2018“…Both mechanism was used to maintain data integrity between the prices corresponding to the product. …”
Get full text
Get full text
Thesis -
7
Implementation of Station-To-Station (STS) protocol using Elliptic Curve Digital Signature Al Algorithm / Muhammad Faris Fakhri Rozi, Alya Syuhada Ismail and Emylia Suhaimi
Published 2018“…Elliptic Curve Digital Signature Algorithms (ECDSA) is implemented in Station-To¬ Station protocol in order to give an improvement in the secret key exchange between two parties. …”
Get full text
Get full text
Student Project -
8
-
9
Secured route optimization in mobile IPv6 wireless networks in terms of data integrity
Published 2008“…An enhanced security algorithm is developed on top of MIPv6 RO to secure data and prepare safe communication between MN and CN. …”
Get full text
Get full text
Conference or Workshop Item -
10
-
11
Enhancing security performance with parallel crypto operations in SSL bulk data transfer phase
Published 2007“…The proposed algorithm performs the encryption of the data and the calculation of the MAC in parallel. …”
Get full text
Get full text
Conference or Workshop Item -
12
Improving security performance with parallel crypto operations in SSL bulk data transfer
Published 2009“…The proposed algorithm performs the encryption of the data and the calculation of the MAC in parallel. …”
Get full text
Get full text
Get full text
Article -
13
Meta-heuristics and deep learning for energy applications: Review and open research challenges (2018?2023)
Published 2025“…Conversely, meta-heuristic algorithms offer optimization capabilities but suffer from computational burdens, especially with high-dimensional data. …”
Review -
14
Proposed system for data security in distributed computing in using triple data encryption standard and Rivest Shamir Adlemen
Published 2023“…This increases the security problems in security such as data confidentiality, data integrity and data availability, so the solution of such problems are conducted by adopting data encryption is very important for securing users data. …”
Article -
15
Enhancing benthic habitat mapping: A review of integrating satellite and side scan sonar data for improved classification accuracy
Published 2024“…The integration of acoustically derived data and/or bathymetric data with satellite imagery can influence mapping results to varying degrees. …”
Get full text
Get full text
Article -
16
Pembangunan model regresi poisson sifar-melambung berintegrasi dalam biostatistik
Published 2018“…The combination of these methods is referred to as the Integrated Model. The second phase is the comparison of the findings between the Integrated Model and the existing method. …”
Get full text
Get full text
Thesis -
17
An Efficient IDS Using Hybrid Magnetic Swarm Optimization in WANETs
Published 2018“…In order to improve the effectiveness of intrusion detection systems (IDSs), data analysis methods such as data mining and classification methods are often integrated with IDSs. …”
Get full text
Get full text
Article -
18
An efficient IDS using hybrid Magnetic swarm optimization in WANETs
Published 2018“…In order to improve the effectiveness of intrusion detection systems (IDSs), data analysis methods such as data mining and classification methods are often integrated with IDSs. …”
Get full text
Get full text
Get full text
Get full text
Article -
19
Integration of machine learning and remote sensing for above ground biomass estimation through Landsat-9 and field data in temperate forests of the Himalayan region
Published 2024“…This study examines the relationship between predictors from Landsat-9 remote sensing data and several topographical features. …”
Get full text
Get full text
Get full text
Article -
20
Replica Creation Algorithm for Data Grids
Published 2012“…This thesis presents a new replication algorithm that improves data access performance in data grids by distributing relevant data copies around the grid. …”
Get full text
Get full text
Get full text
Get full text
Thesis
