Search Results - (( java application customization algorithm ) OR ( data integration index algorithm ))
Search alternatives:
- customization algorithm »
- integration index »
- java application »
- data integration »
- index algorithm »
-
1
An Integrated Principal Component Analysis And Weighted Apriori-T Algorithm For Imbalanced Data Root Cause Analysis
Published 2016“…A semiconductor manufacturing case study with Work In Progress data and true alarm data is used to proof the proposed algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
2
-
3
Optimized PV-Battery Systems using Backtracking Search Algorithm for Sustainable Energy Solutions
Published 2024Conference Paper -
4
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
Get full text
Get full text
Thesis -
5
-
6
-
7
Enhancing Cryptographic Resilience through Symmetric Encryption Algorithm Utilizing Variable Length Chromosomes Genetic Algorithm
Published 2026journal::journal article -
8
Immune Multiagent System for Network Intrusion Detection using Non-linear Classification Algorithm
Published 2010Get full text
Get full text
Get full text
Citation Index Journal -
9
Melanoma skin cancer recognition using negative selection algorithm / Muhammad Rushamir Hakimi Ruslan
Published 2017“…The Negative Selection Algorithm has been successfully applied in several application areas such as fault detection, virus detection and data integrity protection. …”
Get full text
Get full text
Thesis -
10
-
11
A Systematic Review Of Machine Learning Algorithms For Mental Health Detection Using Social Media Data
Published 2026journal::journal article -
12
Cryptographic Algorithm Using Matrix Inversion as Data Protection
Published 2011Get full text
Get full text
Get full text
Article -
13
Finger exoskeleton for early acute stroke rehabilitation: control design and performance analysis / Muhammad Naim Abdu Salam
Published 2020“…The second objective was to assess the performance of position control for index finger in rehabilitation. The control algorithm utilized was PID control algorithm. …”
Get full text
Get full text
Thesis -
14
-
15
Transient analysis for leak signature identification based on Hilbert Huang transform and integrated kurtosis algorithm for z-notch filter technique
Published 2018“…The current research presents the implementation of an integrated kurtosisbased algorithm for a z-filter technique (Ikaz) to kurtosis ratio (Ikaz-kurtosis), for this allows automatic selection of the IMF that should be used. …”
Get full text
Get full text
Thesis -
16
-
17
An Efficient IDS Using Hybrid Magnetic Swarm Optimization in WANETs
Published 2018“…In order to improve the effectiveness of intrusion detection systems (IDSs), data analysis methods such as data mining and classification methods are often integrated with IDSs. …”
Get full text
Get full text
Article -
18
An efficient IDS using hybrid Magnetic swarm optimization in WANETs
Published 2018“…In order to improve the effectiveness of intrusion detection systems (IDSs), data analysis methods such as data mining and classification methods are often integrated with IDSs. …”
Get full text
Get full text
Get full text
Get full text
Article -
19
Systematic Literature Review for Lightweight Authentication Algorithm in the IOT
Published 2024journal::journal article -
20
Water Quality Evaluation and Analysis by Integrating Statistical and Machine Learning Approaches
Published 2026journal::journal article
