Search Results - (( knowledge prevention using algorithm ) OR ( java application optimisation algorithm ))

Refine Results
  1. 1

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…The system is essentially a three-part development, utilising Android, Java Servlets, and Arduino platforms to create an optimised and automated urban-gardening system. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Web-based expert system for material selection of natural fiber- reinforced polymer composites by Ahmed Ali, Basheer Ahmed

    Published 2015
    “…Finally, the developed expert system was deployed over the internet with central interactive interface from the server as a web-based application. As Java is platform independent and easy to be deployed in web based application and accessible through the World Wide Web (www), this expert system can be one stop application for materials selection.…”
    Get full text
    Get full text
    Thesis
  3. 3

    A Fusion-Based Framework For Explainable Suicide Attempt Prediction by Nordin, Noratikah

    Published 2024
    “…Existing studies on the framework for predictive models using data-driven and knowledge-driven approaches are insufficiently explained and unable to provide an understandable prediction of suicide attempts for suicide prevention in a systematic way. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Shoulder surfing security threat prevention using shifting directions / Tey Boon Hau by Tey, Boon Hau

    Published 2018
    “…A uniform randomization algorithm was used to ensure the images used were randomly allocated within the grid cell for every challenge set. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    Capability requirements on fraud prevention in the Nigeria public sector: perception of forensic accountants and auditors by Lateef, Saheed Ademola

    Published 2017
    “…Similarly, it was found that forensic accountants have higher levels of the skills, knowledge, and ethics on fraud prevention than auditors. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    Bayesian network of influence of sociodemographic variables on dengue related knowledge, attitude, and practices in selected areas in Selangor, Malaysia by Ajibola, Lamidi-Sarumoh Alaba

    Published 2019
    “…The data collected was used to learn the structure of BN via some known algorithms using R programming language. …”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9
  10. 10

    Machine Learning Applications in Offense Type and Incidence Prediction by Balaji, R., Manjula Sanjay, Koti, Harprith, Kaur

    Published 2024
    “…This knowledge can inform the development of more effective prevention and intervention strategies, ultimately contributing to the reduction of harmful behaviors and the enhancement of community well-being…”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Image based authentication using zero-knowledge protocol by Mohamad, Z., Thong, L.Y., Zakaria, A.H., Awang, W.S.W.

    Published 2018
    “…In this paper, a new algorithm that using zero-knowledge protocol as the solution to solving the eavesdropping and shoulder surfing attack to provide better system security. …”
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12

    Development of a modified adaptive protection scheme using machine learning technique for fault classification in renewable energy penetrated transmission line by Olufemi, Osaji Emmanuel

    Published 2020
    “…This study proposed a modified standalone Machine Learning-based Adaptive Protection Scheme (ML-APS) relay' fault classifier model using novel useful hidden Knowledge Discovery from historical fault events Dataset (KDD) from healthy and faulty lines. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Feature Subset Selection in Intrusion Detection Using Soft Computing Techniques by AHMAD, IFTIKHAR

    Published 2011
    “…This research work uses the Knowledge Discovery and Data mining (KDD) cup dataset, which is considered benchmark for evaluating security detection mechanisms. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Forensic accountants, auditors and fraud capability and competence requirements in the Nigerian public sector by Popoola, Oluwatoyin Muse Johnson

    Published 2014
    “…The ten out of fifteen hypotheses were tested through the use of PLS-SEM algorithm and bootstrap techniques on the hypothesized relationships while the remaining five hypotheses of differences among groups were tested using the Mann-Whitney U Test. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    All-in-1 adverse drug reaction reporting system / Long Chiau Ming … [et al.] by Chiau Ming, Long, Karuppannan, Mahmathi, Abdul Wahab, Izyan, Abd Wahab, Mohd Shahezwan, Zulkifly, Hanis Hanum

    Published 2014
    “…The identification of ADR requires knowledge of the pharmacological and pharmacokinetics knowledge of the drugs used. …”
    Get full text
    Get full text
    Get full text
    Book Section
  16. 16

    Implementing Station-to-Station protocol using Multi Prime RSA Cryptosystem / Muhammad Arif Musa Abdullah by Abdullah, Muhammad Arif Musa

    Published 2023
    “…The study recommends to use another type of digital signature algorithm to be used in the proposed method. …”
    Get full text
    Get full text
    Student Project
  17. 17

    Integrated combined layer algorithm of jamming detection and classification in manet / Ahmad Yusri Dak by Dak, Ahmad Yusri

    Published 2019
    “…It involves development of Max-Min Rule-Based Classification Algorithm. The fourth stage is to design evaluation methodology of Max-Min Rule-Based Classification Algorithm using classifier model. …”
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19

    LocPass: A Graphical Password Method to Prevent Shoulder-Surfing by Por, Lip Yee, Adebimpe, Lateef Adekunle, Idris, Mohd Yamani Idna, Khaw, Chee Siong, Ku, Chin Soon

    Published 2019
    “…In the first concept, we used registered locations (something that only the users know) and 5 image directions (something that the users can see) to determine a pass-location (new knowledge). …”
    Get full text
    Get full text
    Article
  20. 20

    Feature Subset Selection in Intrusion Detection Using Soft Computing Techniques by Iftikhar , Ahmad, Azween, Abdullah

    Published 2011
    “…This research work uses the Knowledge Discovery and Data mining (KDD) cup dataset, which is considered benchmark for evaluating security detection mechanisms. …”
    Get full text
    Get full text
    Thesis