Search Results - (( data protection machine algorithm ) OR ( java implication based algorithm ))
Search alternatives:
- protection machine »
- machine algorithm »
- implication based »
- java implication »
-
1
The implications for ahybrid detection technique against malicious sqlattacks on web applications
Published 2025“…The outcome of this study will add to the body of knowledge the most important and recent proposed solutions to mitigate SQL injection attack, in particular those based on machine learning algorithm…”
Get full text
Get full text
Get full text
Article -
2
-
3
-
4
Machine learning and deep learning approaches for cybersecurity: a review
Published 2022“…This paper reviewed intrusion detection systems and discussed what types of learning algorithms machine learning and deep learning are using to protect data from malicious behavior. …”
Get full text
Get full text
Get full text
Get full text
Article -
5
Advanced machine learning algorithm to predict the implication of climate change on groundwater level for protecting aquifer from depletion
Published 2025“…Therefore, the current study aimed to propose an accurate GWL prediction model using advanced machine learning (ML) algorithms in five populated towns, namely Jenderam, Bangi, Beranang, Kajang, and Paya Indah Wetland which are in Selangor, Malaysia. …”
Article -
6
-
7
Water quality monitoring using machine learning and IoT: a review
Published 2024“…ML algorithms can analyze large volumes of water quality data, enabling data-centric approaches to designing, supervising, simulating, assessing, and refining various water treatment and management systems. …”
Get full text
Get full text
Get full text
Get full text
Article -
8
Machine learning in botda fibre sensor for distributed temperature measurement
Published 2023“…An alternative method is proposed, utilizing machine learning algorithms. Therefore, this thesis explores the comparative analysis for BOTDA data processing using the six most suited machine learning algorithms. …”
text::Thesis -
9
Secure Hybrid Scheme For Securing Mqtt Protocol Based On Enhanced Symmetric Algorithm
Published 2023“…Data could be altered by intruders while in transit. …”
Get full text
Get full text
Thesis -
10
Machine-learning-based adaptive distance protection relay to eliminate zone-3 protection under-reach problem on statcom-compensated transmission lines
Published 2020“…Thereby locating the apparent impedance trajectory outside the preset protection coverage as if there was no fault in the system, leading to protection safety compromise. …”
Get full text
Get full text
Thesis -
11
Implementation of machine learning algorithms for streamflow prediction of Dokan dam
Published 2023“…This study aims at comparing the application of deep learning algorithms and conventional machine learning algorithms for predicting reservoir inflow. …”
text::Thesis -
12
Enhancing project completion date prediction using a hybrid model: rule-based algorithm and machine learning algorithm
Published 2025“…The study employs a hybrid predictive model that combines Big Data technologies, Extract Load Transfer (ELT) processes, rule-based algorithms (RBA), machine learning (ML), and Power BI visualizations. …”
Get full text
Get full text
Get full text
Article -
13
Enhancement of network security by use machine learning
Published 2019“…The coding is designed in a way that there is an attack of malicious to destroy the data. Because there is a machine-learning scheme in the security, the system have done automatically protect the data and hence the data is recovered at the end of the system. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
14
Balancing data utility versus information loss in data-privacy protection using k-Anonymity
“…The anonymized files go through the classification process by some machine-learning algorithms i.e., Naive Bayes, J48 and neural network in order to check a balance between data anonymity and data utility. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
15
Packet header support using hybrid security approach for securing trivial file transfer protocol in machine to machine applications / Nur Nabila Mohamed
Published 2019“…Trivial File Transfer Protocol (TFTP) is noted as one of the well-known protocols for managing data transfer in Machine to Machine (M2M) constrained embedded system due to its lightweight features and compatibility. …”
Get full text
Get full text
Thesis -
16
-
17
-
18
-
19
-
20
Design Of FPGA-Based Encryption Chipusing Blowfish Algorithm
Published 2006“…By using FPGA device, data can be encrypted or decrypted in real time and this would be a great tool for security purpose, such as ATM machine. …”
Get full text
Get full text
Monograph
