Search Results - (( java implication based algorithm ) OR ( data protection act algorithm ))

  • Showing 1 - 13 results of 13
Refine Results
  1. 1

    Advanced current and power consumption monitoring with overload protection / Dinie Haqeemy Abdul Mu'izz by Abdul Mu'izz, Dinie Haqeemy

    Published 2024
    “…The system combines modern current and power monitoring devices with an intelligent overload protection mechanism. The monitoring devices use highly precise sensors and advanced algorithms to measure and analyze current and power consumption in real time. …”
    Get full text
    Get full text
    Student Project
  2. 2
  3. 3

    Encryption selection for WLAN IEEE802.11G by Ahmad, Zahrol Azam

    Published 2013
    “…Meanwhile for encryption algorithms, the data was encrypted using Kryptel, an encryption freeware. …”
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5

    Algorithm for the legal regulation of internet financial crime by Ambaras Khan, Hanna, Ab. Rahman, Suhaimi, Xinxin, Mao

    Published 2024
    “…Data processing for criminal acts on Internet finance platforms is crucial, with the utilization of random forest algorithms, including Decision tree and Bagging integration algorithms. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Image orientation watermarking technique for copyright protection by Jasim, Hend Muslim

    Published 2016
    “…In the Pre-Protection design, it investigates the proofing on image operation corruption to support the principle used in showing the preliminary impact of data corruption made by resizing. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Remotely sensed imagery data application in mangrove forest: a review by Abdul Whab @ Abdul Wahab, Zulfa, Kamarudin, Norizah

    Published 2018
    “…The mangrove forest ecosystem acts as a shield against the destructive tidal waves, preventing the coastal areas and other properties nearby from severe damages; this protective function certainly deserves attention from researchers to undertake further investigation and exploration. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Machine learning in botda fibre sensor for distributed temperature measurement by Nur Dalilla binti Nordin

    Published 2023
    “…An alternative method is proposed, utilizing machine learning algorithms. Therefore, this thesis explores the comparative analysis for BOTDA data processing using the six most suited machine learning algorithms. …”
    text::Thesis
  9. 9
  10. 10

    Trust‑based lightweight security protocol for device to device multihop cellular communication (TLwS) by Adnan Shahid, Khan, Yasir, Javed, Johari, Abdullah, Kartinah, Zen

    Published 2021
    “…Besides basic function that is direct communication without the need of Base Station (BS), D2D allows small communicating device to act as intermediate device not only for forward the trafcs but also permits the sharing of resources such as spectrum, services, data and social contents for any users that are near the proximity range. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Wavelet based fault tolerant control of induction motor / Khalaf Salloum Gaeid by Gaeid, Khalaf Salloum

    Published 2012
    “…The fault detection algorithm identifies the time and location of each fault. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Distributed joint power control, beamforming and spectrum leasing for cognitive two-way relay networks by Iranpanah, Havzhin

    Published 2017
    “…A search method with numerous advantages over conventional algorithms, has been designed to solve the optimization problems with an enhanced global optimality and convergence speed. …”
    Get full text
    Get full text
    Thesis
  13. 13

    A Spectrogram Image-Based Network Anomaly Detection System Using Deep Convolutional Neural Network by Adnan Shahid, Khan, ZEESHAN, AHMAD, JOHARI, ABDULLAH, FARHAN, AHMAD

    Published 2021
    “…These attacks pose many challenges for network security personnel to protect the computer and network nodes and corresponding data from possible intrusions. …”
    Get full text
    Get full text
    Get full text
    Article