Search Results - (( security application mining algorithm ) OR ( java application optimisation algorithm ))
Search alternatives:
- application optimisation »
- optimisation algorithm »
- security application »
- application mining »
- mining algorithm »
- java application »
-
1
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…The system is essentially a three-part development, utilising Android, Java Servlets, and Arduino platforms to create an optimised and automated urban-gardening system. …”
Get full text
Get full text
Get full text
Article -
2
A comprehensive analysis of blockchain-based cryptocurrency mining impact on energy consumption
Published 2022“…The Proof-of-Work (PoW) algorithm is used for mining ‘Bitcoin’ which is consumed enormous computational power. …”
Get full text
Get full text
Get full text
Article -
3
Effective mining on large databases for intrusion detection
Published 2014Get full text
Get full text
Conference or Workshop Item -
4
Prediction of college student academic performance using data mining techniques.
Published 2013Get full text
Get full text
Conference or Workshop Item -
5
-
6
Improving Extreme Programming Framework With Security Concerns For E-Commerce Applications
Published 2024thesis::doctoral thesis -
7
Profiling network traffic of Sultan Idris Shah building (BSIS) using data mining technique / Rusmawati Ishak
Published 2018“…This research implement unsupervised data mining approach to analyse the network traffic trend of BSIS. …”
Get full text
Get full text
Thesis -
8
Web-based expert system for material selection of natural fiber- reinforced polymer composites
Published 2015“…Finally, the developed expert system was deployed over the internet with central interactive interface from the server as a web-based application. As Java is platform independent and easy to be deployed in web based application and accessible through the World Wide Web (www), this expert system can be one stop application for materials selection.…”
Get full text
Get full text
Thesis -
9
-
10
-
11
Improving intrusion detection using genetic algorithm
Published 2013Get full text
Get full text
Get full text
Article -
12
Unsupervised Anomaly Detection with Unlabeled Data Using Clustering
Published 2005Get full text
Get full text
Conference or Workshop Item -
13
-
14
Intelligent transmission line fault diagnosis using the Apriori associated rule algorithm under cloud computing environment
Published 2024“…The leakage fault cases verify the algorithm�s applicability and complete the correlation diagnosis of water wall leakage fault. …”
Article -
15
Systematic review on ai-blockchain based e-healthcare records management systems
Published 2022“…The performance of AI algorithms is enhanced through the data obtained from a data repository or a reliable, secure, trustworthy, and credible platform. …”
Get full text
Get full text
Get full text
Article -
16
Systematic review on ai-blockchain based e-healthcare records management systems
Published 2022“…The performance of AI algorithms is enhanced through the data obtained from a data repository or a reliable, secure, trustworthy, and credible platform. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
17
Enhanced AI-based anomaly detection method in the intrusion detection system (IDS) / Kayvan Atefi
Published 2019“…Experiments demonstrate and prove that the proposed EBPSO method produces better accuracy mining data and selecting subset of relevant features comparing other algorithms. …”
Get full text
Get full text
Thesis -
18
-
19
Sentiment Analysis of Cyberbullying in Social Media Using Decision Trees
Published 2020Get full text
Get full text
Final Year Project -
20
