Search Results - (( pattern internet protocol algorithm ) OR ( java application customization algorithm ))

  • Showing 1 - 13 results of 13
Refine Results
  1. 1

    A behavioral trust model for internet of healthcare things using an improved FP-growth algorithm and Naïve Bayes classifier by Azad, Saiful, Amin Salem, Saleh Bllagdham, Mahmud, Mufti, Kaiser, M. Shamim, Miah, Md Saef Ullah

    Published 2021
    “…Towards securing these frameworks through an intelligent TMM, this work proposes a machine learning based Behavioral Trust Model (BTM), where an improved Frequent Pattern Growth (iFP-Growth) algorithm is proposed and applied to extract behavioral signatures of various trust classes. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2

    Software agent as an effective tool for managing the Internet of thing data complexity by Mustafa, M.B., Yusoof, M.A.M.

    Published 2017
    “…Businesses have adopted certain algorithms that can help them to extract information from the Internet to discover potentially significant patterns inherent in the database, which can help the online marketing strategy. …”
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    Adaptive security architecture for protecting RESTful web services in enterprise computing environment by Beer, M.I., Hassan, M.F.

    Published 2018
    “…In this modern era of enterprise computing, the enterprise application integration (EAI) is a well-known industry-recognized architectural principle that is built based on loosely coupled application architecture, where service-oriented architecture (SOA) is the architectural pattern for the implementation of EAI, whose computational elements are called as â��services.â�� Though SOA can be implemented in a wide range of technologies, the web services implementation of SOA becomes the current selective choice due to its simplicity that works on basic Internet protocols. …”
    Get full text
    Get full text
    Article
  4. 4

    Adaptive security architecture for protecting RESTful web services in enterprise computing environment by Beer, M.I., Hassan, M.F.

    Published 2018
    “…In this modern era of enterprise computing, the enterprise application integration (EAI) is a well-known industry-recognized architectural principle that is built based on loosely coupled application architecture, where service-oriented architecture (SOA) is the architectural pattern for the implementation of EAI, whose computational elements are called as â��services.â�� Though SOA can be implemented in a wide range of technologies, the web services implementation of SOA becomes the current selective choice due to its simplicity that works on basic Internet protocols. …”
    Get full text
    Get full text
    Article
  5. 5
  6. 6

    Software reusability in green computing / Ibraheem Y. Y. Ahmaro by Y. Y. Ahmaro, Ibraheem

    Published 2013
    “…Telecommuting is the main green computing approach while algorithmic efficiency, power management, voice over internet protocol (VOIP) and virtualization approaches are also commonly used methods. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Profiling network traffic of Sultan Idris Shah building (BSIS) using data mining technique / Rusmawati Ishak by Ishak, Rusmawati

    Published 2018
    “…Orange is a tool that being used in implementing K-Means Clustering Algorithm that could be seen as the most suitable solution to find a network trend pattern of user accessing the Internet and to produce with profiling network. …”
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10

    IoT based IMU sensor network for human arm pose estimation / Jahangir Hassan Khan by Jahangir , Hassan Khan

    Published 2019
    “…The Forward Kinematics approach has great advantage such as being easy to program and its faster computational speed, as compared to the conventional arm pose estimation algorithms. By using the developed arm pose tracking program, several important parameters such as positions of the elbow and wrist with reference to the shoulder joint, moving distance, angular movement speed and movement pattern of arm are successfully measured and estimated. …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    Strategic Profiling and Analytic Modelling of Node Misbehaviour in Adhoc Networks via Game Theory by Olanrewaju, Rashidah Funke, Hassan Abdalla Hashim, Aisha, Yusoff, Siti Hajar

    Published 2018
    “…Understanding the patterns and then deploying the algorithms in security products can reduce intrusion to a greater extent…”
    Get full text
    Get full text
    Monograph
  12. 12

    Design & Development of a Robotic System Using LEGO Mindstorm by Abd Manap, Nurulfajar, Md Salim, Sani Irwan, Haron, Nor Zaidi

    Published 2006
    “…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13