Search Results - (( java implication based algorithm ) OR ( data integration concept algorithm ))

Refine Results
  1. 1

    Hyper-heuristic framework for sequential semi-supervised classification based on core clustering by Adnan, Ahmed, Muhammed, Abdullah, Abd Ghani, Abdul Azim, Abdullah, Azizol, Huyop @ Ayop, Fahrul Hakim

    Published 2020
    “…Existing stream data learning models with limited labeling have many limitations, most importantly, algorithms that suffer from a limited capability to adapt to the evolving nature of data, which is called concept drift. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Ant colony algorithm for text classification in multicore-multithread environment / Ahmad Nazmi Fadzal by Fadzal, Ahmad Nazmi

    Published 2017
    “…Pheromone concept is the main criterion that distinguish ACO to other algorithms. …”
    Get full text
    Get full text
    Thesis
  3. 3

    The Effectiveness Of Steam Integrated Approach Using Scratch Module On Achievement And Computational Thinking In Learning Electricity Concepts by Tan, Wee Ling

    Published 2022
    “…In the other hand, qualitative data was also collected through the designed animated stories and games on electricity concepts by students at the end of the intervention. …”
    Get full text
    Get full text
    Thesis
  4. 4

    WBEC: A web browsers evidence collection toolkit for web browsers usage in Windows 10 by Rayman, Dafiqah Mior, Asmawi, Aziah, Mohd Ariffin, Noor Afiza

    Published 2022
    “…In addition, the SHA-1 hashing algorithm was used to improve the evidence's integrity. …”
    Get full text
    Get full text
    Article
  5. 5

    Hyper-heuristic approaches for data stream-based iIntrusion detection in the Internet of Things by Hadi, Ahmed Adnan

    Published 2022
    “…Most importantly, algorithms that suffer from a limited capability to adapt to the evolving nature of data generated from network traffic are called concept drift. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Improving collection of data type evidence and the integrity of evidence collected using SHA-256 hashing algorithm for web browsers by Asmawi, Aziah, Md Yasin, Sharifah, Mohd Shah, Nur Hazierah

    Published 2024
    “…Therefore, this study proposes the addition in toolkits implementation, the latest software tools version and the latest solution, an improvement proof-of-concept utilizes SHA-256 hashing algorithm to improve the collection of evidence and enhance integrity. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7
  8. 8

    Pembangunan model regresi poisson sifar-melambung berintegrasi dalam biostatistik by Zafakali, Nur Syabiha

    Published 2018
    “…This research also emphasizes the development methodology of data analysis. The data gathered involved two major cases studies of data from patients with Thalassemia among children and the patients with dental caries problems. …”
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10

    Fuzzy algorithm for 3D coastal gemorphology mapping by DInSAR by Marghany, Maged, Hashim, Mazlan

    Published 2007
    “…The basic concept of fuzzy algorithm was used to filter DInSAR data. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    SENSORY EXPERT: DEVICE FOR SENSORY TEST by MOHD ADZMI, MOHD DANIAL AIMAN

    Published 2018
    “…The data is then sent to a Gmail as a storage by developing algorithm in Wi-Fi module NodeMCU ESP8266. …”
    Get full text
    Get full text
    Final Year Project
  12. 12

    An enhanced sequential exception technique for semantic-based text anomaly detection by Taiye, Mohammed Ahmed

    Published 2019
    “…ESET performs text anomaly detection by employing optimized Cosine Similarity, hybridizing LSA with modified SET, and integrating it with Word Sense Disambiguation algorithms specifically Lesk and Selectional Preference. …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design by Shamsiah, Suhaili, Norhuzaimin, Julai, Rohana, Sapawi, Nordiana, Rajaee

    Published 2024
    “…This article analyses a fast implementation of the Hash-based Message Authentication Code (HMAC), which uses its algorithm to ensure the validity and integrity of data to optimise hardware efficiency and design efficacy using the SHA-256 algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design by Shamsiah, Suhaili, Norhuzaimin, Julai, Rohana, Sapawi, Nordiana, Rajaee

    Published 2024
    “…This article analyses a fast implementation of the Hash-based Message Authentication Code (HMAC), which uses its algorithm to ensure the validity and integrity of data to optimise hardware efficiency and design efficacy using the SHA-256 algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  15. 15
  16. 16

    Sizing algorithm for stand-alone AC coupled Hybrid PV-diesel power system under Malaysian climate / Nor Syafiqah Syahirah Mohamed by Mohamed, Nor Syafiqah Syahirah

    Published 2016
    “…The concept of the proposed algorithm is balancing the annual average renewable energy generation and demand. …”
    Get full text
    Get full text
    Thesis
  17. 17

    The moderating effect of algorithm literacy on Over-The-Top platform adoption by Liu, Lu, Mohd Faris De Costa, Mohd Feroz Shah De Costa, Muhammad, Muhamad Sufri, Gong, Shuhui, Liu, Bin

    Published 2024
    “…The algorithm implies the collected user's data to predict, lead, and react to the user's behavior in cyberspace. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Depth linear discrimination-oriented feature selection method based on adaptive sine cosine algorithm for software defect prediction by Nasser, Abdullah, H.M. Ghanem, Waheed Ali, H.Y. Saad, Abdul-Malik, Hamed Abdul-Qawy, Antar Shaddad, A. Ghaleb, Sanaa A, Mohammed Alduais, Nayef Abdulwahab, Din, Fakhrud, Ghetas, Mohamed

    Published 2024
    “…DASC-FS integrates the Adaptive Sine Cosine Algorithm (ASCA) as a search algorithm to determine the relevant features and adopts Depth Linear Discriminant Analysis (D-LDA) to identify the discriminative features that maximize class sepa ration. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19
  20. 20

    Modeling Teacher's Integrity Using Data Mining by Mohd Latifi, Abdul Ghani

    Published 2010
    “…Integrity is a concept of consistency of actions, values, methods, measures, principles, expectations and outcomes. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis