Search Results - (( java pattern classification algorithm ) OR ( using internet mapping algorithm ))

Refine Results
  1. 1

    An ensemble learning method for spam email detection system based on metaheuristic algorithms by Behjat, Amir Rajabi

    Published 2015
    “…Recently, various techniques based on different algorithms have been developed. However, the classification accuracy and computational cost are not satisfied. …”
    Get full text
    Get full text
    Thesis
  2. 2

    An enhanced color image encryption algorithm using LT-PRNG by Mohammed Ismael, Saba

    Published 2018
    “…Several chaos-based image encryption algorithms use low-dimension chaos as the encryption tools. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Electing the best set of features will help to improve the classifier predictions in terms of the normal and abnormal pattern. The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Optimisation model for scheduling MapReduce jobs in big data processing / Ibrahim Abaker Targio Hashem by Ibrahim Abaker , Targio Hashem

    Published 2017
    “…The proposed algorithm is evaluated using tasks scheduling in the scheduling load simulator and validated using statistical modeling. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    An efficient parallel clustering algorithm on big data using Spark by Mallik, Moksud Alam, Zulkurnain, Nurul Fariza, Nizamuddin, Mohammed Khaja, Sarkar, Rashel, Ahmed, S K Jamil

    Published 2022
    “…It is 100 times faster than Map Reduce. Here we are proposing a new parallel fuzzy clustering algorithm called "An efficient parallel clustering algorithm on big data using spark" which deals with real-time processing. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    OPTIMIZATION OF MOBILE TRANSPORT NETWORK USING INTERNET PROTOCOL/MULTI-PROTOCOL LABEL SWITCHING (IP/MPLS) APPROACH by Ngo, Lip Chee

    Published 2014
    “…This report focuses on a research-based project of the title ‘Optimization of Mobile Transport Network using Internet Protocol/Multi-Protocol Label Switching (IP/MPLS) Approach’. …”
    Get full text
    Get full text
    Final Year Project
  7. 7

    OPTIMIZATION OF MOBILE TRANSPORT NETWORK USING INTERNET PROTOCOL/MULTI-PROTOCOL LABEL SWITCHING (IP/MPLS) APPROACH by Ngo, Lip Chee

    Published 2014
    “…This report focuses on a research-based project of the title ‘Optimization of Mobile Transport Network using Internet Protocol/Multi-Protocol Label Switching (IP/MPLS) Approach’. …”
    Get full text
    Get full text
    Final Year Project
  8. 8

    Rtl Implementation Of Secure Hash Algorithm 3 (Sha-3) Towards Smaller Area by Lim , Yen Ruen

    Published 2017
    “…This research implements the SHA-3 in ways such that all the step mapping algorithms are logically combined to only use the input lanes of the state array to eliminate the intermediate logics and reduces the area size. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Image authentication using Zernike moment watermarking by Shojanazeri, Hamid

    Published 2013
    “…The Zernike moments and Sobel edge map are used as watermarks to provide malicious attack classification and locating tampered area. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Generation of IPv6 addresses based on one-to-many reversible mapping using AES by Hakiem, Nashrul, Priantoro, Akhmad Unggul, Siddiqi, Mohammad Umar, Hasan, Talib Hashim

    Published 2012
    “…Each time a user tries to access the network, different IPv6 address will be given which is generated using CFB (Cipher Feedback) mode of AES (Advanced Encryption Standard) algorithm, whereby there is a one-to-many reversible mapping between user and IPv6 addresses. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Book Chapter
  11. 11

    An error-based video quality assessment method with temporal information by Loh, Woei-Tan, Boon, David Liang Bong

    Published 2018
    “…The error signals are used to weight the computed SSIM map and subsequently to compute the quality score. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis outlines the two different implementation techniques of the existing FLEX algorithm using java based parsers and using a query language for XML. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Multi-objective scheduling of MapReduce jobs in big data processing by Hashem, Ibrahim Abaker Targio, Anuar, Nor Badrul, Marjani, Mohsen, Gani, Abdullah, Sangaiah, Arun Kumar, Sakariyah, Adewole Kayode

    Published 2018
    “…Second, a scheduling algorithm using earliest finish time scheduling that considers resource allocation and job scheduling in the cloud is proposed. …”
    Get full text
    Get full text
    Article
  14. 14

    A review on security and privacy issues in E-learning and the MapReduce aproach by Noor Akma, Abu Bakar, Mazlina, Abdul Majid, Khalid, Adam, Kirahman, Ab Razak, Noorhuzaimi@Karimah, Mohd Noor

    Published 2019
    “…Then, we proposed e-Learning using MapReduce algorithm in protecting the security and privacy of eLearning. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Detection of Denial of Service Attacks against Domain Name System Using Neural Networks by Rastegari, Samaneh

    Published 2009
    “…For the entire chain of Internet connectivity the Domain Name System (DNS) provides name to address mapping services. …”
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17

    Brewing perfection: real-time monitoring of arabic coffee using iot and machine learning by Abuzaraida, Mustafa Ali, A. L. gaud, Sarah, Abrahim Hneish, Hamza, Attarbashi, Zainab

    Published 2026
    “…Using the YOLOv8 algorithm, a model was trained to detect and track the state of coffee in real time. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  18. 18

    Database encryption for a Web-based Claims System by Syed Zulkarnain Syed Idrus

    Published 2008
    “…On the other hand, the analysis of encryption algorithms with Web browsers, the results have shown that Twofish algorithm is best suited to the system that has been developed using ASP Web programming language on Internet Explorer. …”
    Get full text
    Thesis
  19. 19

    Rapid Penang travel planner mobile application using GPS positioning and decision-making algorithm / Naslyiana Abdul Latif by Abdul Latif, Naslyiana

    Published 2015
    “…GPS Positioning used for searching nearby location (station) whereas decision making algorithm used for making a decision by provide result on bus recommended, fares and routes. …”
    Get full text
    Get full text
    Thesis
  20. 20

    A COMPARISON STUDY OF DATA CLUSTERING AND VISUALISATION TECHNIQUES WITH VARIOUS DATA TYPES by Ling, Chien

    Published 2020
    “…This study only focuses on three types of clustering techniques which are k-means clustering, agglomerative hierarchical clustering with the ward’s linkage, complete linkage, and average linkage, and Self-Organizing Map (SOM). The clustering algorithms are written using Python language by modifying the coding obtained from the Internet. …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD