Search Results - (( data integration issues algorithm ) OR ( java implication based algorithm ))
Search alternatives:
- integration issues »
- implication based »
- data integration »
- issues algorithm »
- java implication »
-
1
An Integrated Principal Component Analysis And Weighted Apriori-T Algorithm For Imbalanced Data Root Cause Analysis
Published 2016“…A semiconductor manufacturing case study with Work In Progress data and true alarm data is used to proof the proposed algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
2
-
3
AN INTEGRATED TECHNIQUE IN ACHIEVING THE CONFIDENTIALITY, INTEGRITY AND ROBUSTNESS FOR BIG DATA TRANSMISSION
Published 2017“…The data confidentiality, integrity, and data loss are issues during transmission due to inadequate security scheme. …”
Get full text
Get full text
Thesis -
4
Data tampering avoidance for food supply chain traceability system using blockchain technology
Published 2019“…The results showed that the algorithm was able to preserve data integrity up to 100% accuracy.…”
Get full text
Get full text
Thesis -
5
Facial features point localization using modified SIFT scale space / Zulfikri Paidi
Published 2020“…This study aimed to develop a new algorithm in the form of hybrids when the scaling technique in SIFT was integrated with another technique. …”
Get full text
Get full text
Thesis -
6
Reduction-by-percentage compression technique for reducing sizes of plaintext prior to encryption algorithm
Published 2022“…One of the approaches to overcome these issues is by integrating data compression technique into cryptosystem. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
7
Unified GPU Technique to Boost Confidentiality, Integrity and Trim Data Loss in Big Data Transmission
Published 2020“…Data integrity, confidentiality and data loss are the issues that arise during transmission because of the use of an inadequate security scheme. …”
Get full text
Get full text
Article -
8
Empowering cloud providers: optimised locust-inspired algorithm for SLA violation mitigation in green cloud computing
Published 2025“…It enhances the locust-inspired algorithm by integrating SLA-awareness and adaptive host classification and is evaluated using real workload traces in the CloudSim toolkit. …”
Get full text
Get full text
Get full text
Article -
9
Rough-Set-and-Genetic-Algorithm based data mining and Rule Quality Measure to hypothesize distance protective relay operation characteristics from relay event report
Published 2011“…Firstly, the data mining approach of the integrated-Rough-Set-and-Genetic-Algorithm is used to discover the relay CD-decision algorithm. …”
Get full text
Get full text
Article -
10
An Optimized Binary Scheduling Controller for Microgrid Energy Management Considering Real Load Conditions
Published 2024“…The controller's aims include minimizing total operating costs for distributed energy resources and solving intricate constraint optimization issues with scheduling management operations. The proposed approach's effectiveness is evaluated within an IEEE 14-bus configuration with five microgrids (MGs) integrated with RESs using real load data from Perlis, Malaysia. …”
Conference Paper -
11
-
12
Development of Technical Safety Dashboard Using Microsoft Power BI Integration with R
Published 2020Get full text
Get full text
Final Year Project -
13
Artificial immune system based on real valued negative selection algorithms for anomaly detection
Published 2015“…The Real-Valued Negative Selection Algorithms, which are the focal point of this research, generate their detector sets based on the points of self data. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
14
-
15
Design and implementation of multimedia digital matrix system
Published 2005“…Besides, the algorithm enables an accurate prediction to the center of data eye with an even number of oversampling clock to data rate ratio. …”
Get full text
Get full text
Conference or Workshop Item -
16
Data modification attacks protection using blockchain signing and verification process in bluetooth low energy network / Aiman Nurrasyid Shahrul Kamil
Published 2020“…Data integrity is a major concern in IoT technologies, and this issue has started to increase in recent years due to the use of Bluetooth Low Energy (BLE) devices. …”
Get full text
Get full text
Thesis -
17
Enhanced computational methods for detection and interpretation of heart disease based on ensemble learning and autoencoder framework / Abdallah Osama Hamdan Abdellatif
Published 2024“…This thesis presents two innovative methods that holistically address these challenges at algorithmic and data levels to enhance heart disease detection. …”
Get full text
Get full text
Get full text
Thesis -
18
Hybrid weight deep belief network algorithm for anomaly-based intrusion detection system
Published 2022“…In future, the HW-DBN algorithm can be proposed as an integrated deep Learning for the classification performance of attack detection models.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
19
Fuzzy clustering method and evaluation based on multi criteria decision making technique
Published 2018“…The proposed algorithm is used as a pre-processing method for data followed by Gustafson-Kessel (GK) algorithm to classify credit scoring data. …”
Get full text
Get full text
Get full text
Thesis -
20
An integrated model to email spam classification using an enhanced grasshopper optimization algorithm to train a multilayer perceptron neural network
Published 2021Get full text
Get full text
Conference or Workshop Item
