Search Results - (( java implication based algorithm ) OR ( data integration concept algorithm ))
Search alternatives:
- integration concept »
- implication based »
- concept algorithm »
- java implication »
- data integration »
-
1
Hyper-heuristic framework for sequential semi-supervised classification based on core clustering
Published 2020“…Existing stream data learning models with limited labeling have many limitations, most importantly, algorithms that suffer from a limited capability to adapt to the evolving nature of data, which is called concept drift. …”
Get full text
Get full text
Get full text
Article -
2
Ant colony algorithm for text classification in multicore-multithread environment / Ahmad Nazmi Fadzal
Published 2017“…Pheromone concept is the main criterion that distinguish ACO to other algorithms. …”
Get full text
Get full text
Thesis -
3
The Effectiveness Of Steam Integrated Approach Using Scratch Module On Achievement And Computational Thinking In Learning Electricity Concepts
Published 2022“…In the other hand, qualitative data was also collected through the designed animated stories and games on electricity concepts by students at the end of the intervention. …”
Get full text
Get full text
Thesis -
4
WBEC: A web browsers evidence collection toolkit for web browsers usage in Windows 10
Published 2022“…In addition, the SHA-1 hashing algorithm was used to improve the evidence's integrity. …”
Get full text
Get full text
Article -
5
Hyper-heuristic approaches for data stream-based iIntrusion detection in the Internet of Things
Published 2022“…Most importantly, algorithms that suffer from a limited capability to adapt to the evolving nature of data generated from network traffic are called concept drift. …”
Get full text
Get full text
Thesis -
6
Improving collection of data type evidence and the integrity of evidence collected using SHA-256 hashing algorithm for web browsers
Published 2024“…Therefore, this study proposes the addition in toolkits implementation, the latest software tools version and the latest solution, an improvement proof-of-concept utilizes SHA-256 hashing algorithm to improve the collection of evidence and enhance integrity. …”
Get full text
Get full text
Get full text
Article -
7
-
8
Pembangunan model regresi poisson sifar-melambung berintegrasi dalam biostatistik
Published 2018“…This research also emphasizes the development methodology of data analysis. The data gathered involved two major cases studies of data from patients with Thalassemia among children and the patients with dental caries problems. …”
Get full text
Get full text
Thesis -
9
-
10
Fuzzy algorithm for 3D coastal gemorphology mapping by DInSAR
Published 2007“…The basic concept of fuzzy algorithm was used to filter DInSAR data. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
11
SENSORY EXPERT: DEVICE FOR SENSORY TEST
Published 2018“…The data is then sent to a Gmail as a storage by developing algorithm in Wi-Fi module NodeMCU ESP8266. …”
Get full text
Get full text
Final Year Project -
12
An enhanced sequential exception technique for semantic-based text anomaly detection
Published 2019“…ESET performs text anomaly detection by employing optimized Cosine Similarity, hybridizing LSA with modified SET, and integrating it with Word Sense Disambiguation algorithms specifically Lesk and Selectional Preference. …”
Get full text
Get full text
Get full text
Thesis -
13
Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design
Published 2024“…This article analyses a fast implementation of the Hash-based Message Authentication Code (HMAC), which uses its algorithm to ensure the validity and integrity of data to optimise hardware efficiency and design efficacy using the SHA-256 algorithm. …”
Get full text
Get full text
Get full text
Article -
14
Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design
Published 2024“…This article analyses a fast implementation of the Hash-based Message Authentication Code (HMAC), which uses its algorithm to ensure the validity and integrity of data to optimise hardware efficiency and design efficacy using the SHA-256 algorithm. …”
Get full text
Get full text
Get full text
Get full text
Article -
15
-
16
Sizing algorithm for stand-alone AC coupled Hybrid PV-diesel power system under Malaysian climate / Nor Syafiqah Syahirah Mohamed
Published 2016“…The concept of the proposed algorithm is balancing the annual average renewable energy generation and demand. …”
Get full text
Get full text
Thesis -
17
The moderating effect of algorithm literacy on Over-The-Top platform adoption
Published 2024“…The algorithm implies the collected user's data to predict, lead, and react to the user's behavior in cyberspace. …”
Get full text
Get full text
Get full text
Article -
18
Depth linear discrimination-oriented feature selection method based on adaptive sine cosine algorithm for software defect prediction
Published 2024“…DASC-FS integrates the Adaptive Sine Cosine Algorithm (ASCA) as a search algorithm to determine the relevant features and adopts Depth Linear Discriminant Analysis (D-LDA) to identify the discriminative features that maximize class sepa ration. …”
Get full text
Get full text
Get full text
Article -
19
-
20
Modeling Teacher's Integrity Using Data Mining
Published 2010“…Integrity is a concept of consistency of actions, values, methods, measures, principles, expectations and outcomes. …”
Get full text
Get full text
Get full text
Get full text
Thesis
