Search Results - (( java implication based algorithm ) OR ( data protection act algorithm ))
Search alternatives:
- implication based »
- java implication »
- protection act »
- act algorithm »
-
1
Advanced current and power consumption monitoring with overload protection / Dinie Haqeemy Abdul Mu'izz
Published 2024“…The system combines modern current and power monitoring devices with an intelligent overload protection mechanism. The monitoring devices use highly precise sensors and advanced algorithms to measure and analyze current and power consumption in real time. …”
Get full text
Get full text
Student Project -
2
-
3
Encryption selection for WLAN IEEE802.11G
Published 2013“…Meanwhile for encryption algorithms, the data was encrypted using Kryptel, an encryption freeware. …”
Get full text
Get full text
Thesis -
4
-
5
Algorithm for the legal regulation of internet financial crime
Published 2024“…Data processing for criminal acts on Internet finance platforms is crucial, with the utilization of random forest algorithms, including Decision tree and Bagging integration algorithms. …”
Get full text
Get full text
Get full text
Article -
6
Image orientation watermarking technique for copyright protection
Published 2016“…In the Pre-Protection design, it investigates the proofing on image operation corruption to support the principle used in showing the preliminary impact of data corruption made by resizing. …”
Get full text
Get full text
Get full text
Thesis -
7
Remotely sensed imagery data application in mangrove forest: a review
Published 2018“…The mangrove forest ecosystem acts as a shield against the destructive tidal waves, preventing the coastal areas and other properties nearby from severe damages; this protective function certainly deserves attention from researchers to undertake further investigation and exploration. …”
Get full text
Get full text
Get full text
Article -
8
Machine learning in botda fibre sensor for distributed temperature measurement
Published 2023“…An alternative method is proposed, utilizing machine learning algorithms. Therefore, this thesis explores the comparative analysis for BOTDA data processing using the six most suited machine learning algorithms. …”
text::Thesis -
9
Digital Quran With Storage Optimization Through Duplication Handling And Compressed Sparse Matrix Method
Published 2024thesis::doctoral thesis -
10
Trust‑based lightweight security protocol for device to device multihop cellular communication (TLwS)
Published 2021“…Besides basic function that is direct communication without the need of Base Station (BS), D2D allows small communicating device to act as intermediate device not only for forward the trafcs but also permits the sharing of resources such as spectrum, services, data and social contents for any users that are near the proximity range. …”
Get full text
Get full text
Get full text
Get full text
Article -
11
Wavelet based fault tolerant control of induction motor / Khalaf Salloum Gaeid
Published 2012“…The fault detection algorithm identifies the time and location of each fault. …”
Get full text
Get full text
Thesis -
12
Distributed joint power control, beamforming and spectrum leasing for cognitive two-way relay networks
Published 2017“…A search method with numerous advantages over conventional algorithms, has been designed to solve the optimization problems with an enhanced global optimality and convergence speed. …”
Get full text
Get full text
Thesis -
13
A Spectrogram Image-Based Network Anomaly Detection System Using Deep Convolutional Neural Network
Published 2021“…These attacks pose many challenges for network security personnel to protect the computer and network nodes and corresponding data from possible intrusions. …”
Get full text
Get full text
Get full text
Article
