Search Results - (( java implication based algorithm ) OR ( data integration connection algorithm ))

Refine Results
  1. 1

    Load and service adaptive algorithm (LSAA) for tight coupling based integration architecture by Aziz, A., Saad, N.M.

    Published 2014
    “…The LSAA algorithm exhibits notable enhancement compare to the without LSAA algorithm, in terms of connection blocking probability and system resource utilization. …”
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2

    Multi-Hop Selective Constructive Interference Flooding Protocol For Wireless Sensor Networks by Alhalabi, Huda A. H.

    Published 2019
    “…MSCIF integrates three main algorithms: clustering algorithm, selection algorithm, and a synchronized flooding. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Automated data process in participatory sensing using QR-code and EAN-13 barcode by Che Ya, Mohamad Fakhrul Syafiq

    Published 2018
    “…The results showed that the algorithm was able to preserving data integrity with 99.13% and up to 100% accuracy.…”
    Get full text
    Get full text
    Thesis
  4. 4

    Optimization of supply chain management by simulation based RFID with XBEE Network by Soomro, Aftab Ahmed

    Published 2015
    “…This has been achieved by the integration of RFID-XBee network with database connectivity through Internet of Things (IoT). …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    Smart IoT energy optimisation and localisation monitoring for e-bike sharing by Mohamed, Mawada Ahmed, Toha, Siti Fauziah, Rahman, Md Ataur, Khairudin, Moh.

    Published 2025
    “…The methodology involved integrating sensors to collect key data, implementing connectivity for real-time monitoring, and developing an energy optimization algorithm to prolong battery life, improving the efficiency of the e-bike sharing system. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  6. 6
  7. 7
  8. 8

    Enhancing security performance with parallel crypto operations in SSL bulk data transfer phase by Alaidaros, Hashem Mohammed, A. Rasid, Mohd Fadlee, Othman, Mohamed, Raja Abdullah, Raja Syamsul Azmir

    Published 2007
    “…The proposed algorithm performs the encryption of the data and the calculation of the MAC in parallel. …”
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    Improving security performance with parallel crypto operations in SSL bulk data transfer by Alaidaros, Hashem Mohammed, Othman, Mohamed, A. Rasid, Mohd Fadlee

    Published 2009
    “…The proposed algorithm performs the encryption of the data and the calculation of the MAC in parallel. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10
  11. 11

    Hybrid weight deep belief network algorithm for anomaly-based intrusion detection system by Maseer, Ziadoon Kamil

    Published 2022
    “…In future, the HW-DBN algorithm can be proposed as an integrated deep Learning for the classification performance of attack detection models.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    Normalized Relational Storage for Extensible Markup Language (XML) Schema by Kamsuriah, Ahmad, Reduan, Samad

    Published 2011
    “…Results: We show that our algorithm is efficient in terms of reducing data redundancy and preserving semantic expression. …”
    Get full text
    Get full text
    Journal
  13. 13
  14. 14

    Using RGB colour combination in coloured quick response (QR) code algorithm to enhance QR code capacity by Azizi, Abas

    Published 2018
    “…Furthermore, it also introduces a partial encoding/decoding algorithm that allows the stored data to be manipulated. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    A Map-matching Algorithm to Improve Vehicle Tracking Systems Accuracy by Agung Dewandaru, Agung

    Published 2008
    “…The thesis presents a new distance metric for curve-to-curve mapmatching technique, integrated with a framework algorithm which is able to maintain many possible route hypotheses and pick the most likely hypothesis at a time, enabling future corrections if necessary, therefore providing intelligent guesses with considerable accuracy. …”
    Get full text
    Get full text
    Final Year Project
  16. 16

    DeepIoT.IDS: Hybrid deep learning for enhancing IoT network intrusion detection by A. Mostafa, Salama, Al-Azzawi, Ziadoon Kamil Maseer, Bahaman, Nazrulazhar, Yusof, Robiah, Musa, Omar, Al-rimy, Bander Ali Saleh

    Published 2021
    “…Recently, researchers have suggested deep learning (DL) algorithms to define intrusion features through training empirical data and learning anomaly patterns of attacks. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17
  18. 18

    A Map-matching Algorithm to Improve Vehicle Tracking Systems Accuracy by Dewandaru, Agung

    Published 2008
    “…The results showed that the proposed algorithm is able to improve the map-matching accuracy as compared to the point-to-curve algorithm. …”
    Get full text
    Get full text
    Thesis
  19. 19

    INFOBANJIR: innovative geospatial technology for flood information / Zuelaiqa Salmie Salim and Ahmad Zulhilmi Ahmad Faisal by Salim, Zuelaiqa Salmie, Ahmad Faisal, Ahmad Zulhilmi

    Published 2024
    “…The system is integrated with weather data for continuous data collection, processed through sophisticated algorithms to monitor flood info setup. …”
    Get full text
    Get full text
    Student Project
  20. 20

    Mining and integration of oral cancer genomics for predictive therapeutics / Bernard Lee Kok Bang by Bernard Lee, Kok Bang

    Published 2019
    “…Technical evaluation of performance reliability of six gene signature similarity scoring algorithms showed that the Weighted Connectivity Score or the statistically significant Connectivity Map, are prime candidates for upgrading the current core algorithm of DeSigN, which is based on the Kolmogorov-Smirnov statistic. …”
    Get full text
    Get full text
    Thesis