Search Results - (( development data protection algorithm ) OR ( java data visualization algorithm ))

Refine Results
  1. 1

    Enhanced bibliographic data retrieval and visualization using query optimization and spectral centrality measure by Ramasamy, Chitra, Zolkepli, Maslina

    Published 2019
    “…This study proposing an enhance bibliographic data retrieval and visualization using hybrid clustering method consists of K-harmonic mean (KHM) and Spectral Algorithm and eigenvector centrality measure. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Web-based RIG performance reporting system using interactive visualization techniques / Amir Hambaly Nasaruddin by Nasaruddin, Amir Hambaly

    Published 2019
    “…The result of this project is all algorithm for visualizing data is functioning and the output produced from the system is correct and effective. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Dynamic force-directed graph with weighted nodes for scholar network visualization by Mohd. Aris, Khalid Al-Walid, Ramasamy, Chitra, Mohd Aris, Teh Noranis, Zolkepli, Maslina

    Published 2022
    “…The approach is realized by creating a web-based interface using D3 JavaScript algorithm that allows the visualization to focus on how data are connected to each other more accurately than the conventional lines of data seen in traditional data representation. …”
    Get full text
    Get full text
    Article
  4. 4

    Design Of Robot Motion Planning Algorithm For Wall Following Robot by Ali Hassan, Muhamad Khairul

    Published 2006
    “…Computer A will be sent the data to computer B through the internet/LAN using JAVA program. …”
    Get full text
    Get full text
    Monograph
  5. 5

    Mathematical simulation for 3-dimensional temperature visualization on open source-based grid computing platform by Alias, Norma, Satam, Noriza, Abd. Ghaffar, Zarith Safiza, Darwis, Roziha, Hamzah, Norhafiza, Islam, Md. Rajibul

    Published 2009
    “…The development of this architecture is based on several programming language as it involves algorithm implementation on C, parallelization using Parallel Virtual Machine (PVM) and Java for web services development. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    State-of-the-art in techniques of text digital watermarking: challenges and limitations by Al-Maweri, Nasr Addin Ahmed Salem, Ali, Roslizah, Wan Adnan, Wan Azizun, Ramli, Abd Rahman, Syed Ahmad Abdul Rahman, Sharifah Mumtazah

    Published 2016
    “…Various types of data, including images, videos, audio and text documents, have given cause for the development of different methods for their protection. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Development Of Machine Learning User Interface For Pump Diagnostics by Lee, Zhao Yang

    Published 2022
    “…Build up a user interface by using Visual Studio Code (VSC) to run the coding of Cascading Style Sheet (CSS), Hyper Text Markup Language (HTML) and JavaScript (JS) as a webpage and connect to Azure Machine Learning Model and this will allow the user from using the model from a webpage when they have active internet with any devices.…”
    Get full text
    Get full text
    Monograph
  8. 8
  9. 9

    Development of Lightning Protection System (LPS) Designing Tool by Idris, Samueil

    Published 2015
    “…The tool would be developed and conducted by using Microsoft Excel 2010 since the algorithm was fit to be formulated in this software. …”
    Get full text
    Get full text
    Final Year Project
  10. 10

    Novel rule base development from IED-resident big data for protective relay analysis expert system by Othman, Mohammad Lutfi, Aris, Ishak, Ananthapadmanabha, Thammaiah

    Published 2016
    “…The developed PRAY runs its relay analysis by, first, validating whether a protective relay undertest operates correctly as expected by way of comparison between hypothesized and actual relay behavior. …”
    Get full text
    Get full text
    Book Section
  11. 11

    A parallel XTS encryption mode of operation by Alomari, Mohammad Ahmed, Samsudin, Khairulmizam, Ramli, Abdul Rahman

    Published 2009
    “…It is known that the most efficient techniques to protect storage devices are using cryptography. Developing newer and more secure encryption algorithms and modes of operation might be critically important to protect these devices since conventional disk encryption algorithms, such as CBC mode, have shown serious security flaws. …”
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12

    Enhanced privacy protection from location dependent attacks in location based services using spatial cloaking by Saravanan, Perumal Shanthi, Balasundaram, Sadhu Ramakrishnan

    Published 2020
    “…This paper presents a solution to protect users from location-dependent attacks by improving the existing clique based cloaking algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Enhanced Privacy Protection Against Location-Dependent Attacks in Location Based Services Using Spatial Cloaking by Saravanan, Perumal Shanthi, Balasundaram, Sadhu Ramakrishnan

    Published 2020
    “…This paper presents a solution to protect users from location-dependent attacks by improving the existing clique based cloaking algorithm. …”
    Get full text
    Get full text
    Article
  14. 14

    Melanoma skin cancer recognition using negative selection algorithm / Muhammad Rushamir Hakimi Ruslan by Ruslan, Muhammad Rushamir Hakimi

    Published 2017
    “…The Negative Selection Algorithm has been successfully applied in several application areas such as fault detection, virus detection and data integrity protection. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Implementation of a parallel XTS encryption mode of operation by Alomari, Mohammad Ahmed, Samsudin, Khairulmizam, Ramli, Abdul Rahman

    Published 2014
    “…It is known that the most efficient techniques to protect storage devices are using cryptography. Developing newer and more secure encryption algorithms and modes of operation might be critically important to protect these devices since conventional disk encryption algorithms, such as CBC mode, have shown serious security flaws. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Tacit knowledge for business intelligence framework using cognitive-based approach by Surbakti, Herison

    Published 2022
    “…The framework was tested on 23 librarians from several university libraries in West Java and Yogyakarta, Indonesia. The algorithm starts with a content targeted interview to identify the list of problems faced by librarians. …”
    Get full text
    Get full text
    Thesis
  17. 17

    A new 128-bit block cipher by Mohd Ali, Fakariah Hani

    Published 2009
    “…The existence of this new 128-bit block cipher algorithm will increase the protection of the national information infrastructure and also will contribute as an alternative to other cryptographic algorithms in security in the computing industry.…”
    Get full text
    Get full text
    Thesis
  18. 18

    Data modification attacks protection using blockchain signing and verification process in bluetooth low energy network / Aiman Nurrasyid Shahrul Kamil by Shahrul Kamil, Aiman Nurrasyid

    Published 2020
    “…The issue of providing end-toend data protection should has been given highest priority by IoT application developer because the data in both private and public networks can be modified and disrupted by attacker. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Access control model based on trust, purpose, and role in materialized view for privacy protection by Salji, Mohd Rafiz

    Published 2019
    “…Role-based access control model in materialized view has been proposed to protect customer's data. However, relying on role only is insufficient and inefficient to protect data especially sensitive attributes. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Development of intrusion detection system using residual feedforward neural network algorithm by Rustam, Rushendra, Ramli, Kalamullah, Hayati, Nur, Ihsanto, Eko, Gunawan, Teddy Surya, Halbouni, Asmaa Hani

    Published 2022
    “…An intrusion detection system (IDS) is required to protect data from security threats that infiltrate unwanted information via a regular channel, both during storage and transmission. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper