Search Results - (( developing security mining algorithm ) OR ( java implication based algorithm ))

  • Showing 1 - 14 results of 14
Refine Results
  1. 1
  2. 2
  3. 3

    Intelligent transmission line fault diagnosis using the Apriori associated rule algorithm under cloud computing environment by Al-Jumaili A.H.A., Muniyandi R.C., Hasan M.K., Singh M.J., Paw J.K.S.

    Published 2024
    “…The result shows that the proposed method improves the security problem of the system, the message-digest algorithm (MD5) is used to encrypt the user password, and a strict role authorisation system is designed to realise the access and manage the system�s security. � 2023 by author(s). …”
    Article
  4. 4

    Development of a Web Access Control Technique Based User Access Behavior by Abdelrahman, Selmaelsheikh

    Published 2004
    “…This thesis discusses about designs and develops techniques and algorithms for performing web access control. …”
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6

    Smart Agriculture Economics and Engineering: Unveiling the Innovation Behind AI-Enhanced Rice Farming by Zun Liang, Chuan, Tham, Ren Sheng, Tan, Chek Cheng, Abraham Lim, Bing Sern, David Lau, King Luen, Chong, Yeh Sai

    Published 2024
    “…To address these challenges, an innovative Artificial Intelligence-based (AI-based) predictive algorithm has been proposed, leveraging the Cross Industry Standard Process for Data Mining (CRISP-DM) data science framework. …”
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7
  8. 8

    Healthcare-Chain: Blockchain-Enabled Decentralized Trustworthy System in Healthcare Management Industry 4.0 with Cyber Safeguard by Islam, Md. Shohidul, Mohamed Ariff, Ameedeen, Rahman, Md. Arafatur, Ajra, Husnul, Zahian, Ismail

    Published 2023
    “…This scheme revealed the optimal performance in terms of mining health data size, average response time, transaction latency, and throughput for secured block transactions in blockchain networks.…”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Feature selection in intrusion detection, state of the art: A review by Rais, H.M., Mehmood, T.

    Published 2016
    “…With the increase of internet usage the need of security for organizations network also increased. …”
    Get full text
    Get full text
    Article
  10. 10

    Web page design for electronic commerce / Lee Fong Wai by Lee , Fong Wai

    Published 2003
    “…This part covers the introduction of electronic commerce and online shopping, features of the online shopping software available in the market, data mining technology, programming languages, web development tools, database technology and also security issues. …”
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12

    Blockchain-enabled cybersecurity framework for healthcare domain by Islam, Md Shohidul

    Published 2025
    “…It also formulates the algorithms for the development of the proposed blockchain-enabled healthcare framework and evaluates its performance in data transaction management through simulation. …”
    Get full text
    Get full text
    Thesis
  13. 13

    An integrated anomaly intrusion detection scheme using statistical, hybridized classifiers and signature approach by Mohamed Yassin, Warusia

    Published 2015
    “…Intrusion detection systems (IDSs) effectively balance additional security in a computer system by identifying intrusive activities on a computer system, and their enhancements are developing at a surprising rate. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Collective interaction filtering with graph-based descriptors for crowd behaviour analysis by Wong, Pei Voon

    Published 2018
    “…Crowd behaviour analysis plays an important role in high security interests in public areas such as railway stations, shopping centres, and airports, where large populations gather. …”
    Get full text
    Get full text
    Thesis