Search Results - (( data reduction methods algorithm ) OR ( data protection method algorithm ))

Refine Results
  1. 1

    Discovering decision algorithm from a distance relay event report by Othman, Mohammad Lutfi, Aris, Ishak, Abdullah, Senan Mahmood, Ali, Md. Liakot, Othman, Mohammad Ridzal

    Published 2009
    “…The method of discovering the distance relay decision algorithm essentially involved formulating rough set discernibility matrix and function from relay event report, finding reducts of pertinent attributes using genetic algorithm and finally generating relay prediction rules. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Algorithm for the legal regulation of internet financial crime by Ambaras Khan, Hanna, Ab. Rahman, Suhaimi, Xinxin, Mao

    Published 2024
    “…Data processing for criminal acts on Internet finance platforms is crucial, with the utilization of random forest algorithms, including Decision tree and Bagging integration algorithms. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Finger vein verification system using repeated line tracking and dimensionality reduction using PCA algorithms with SURF matching by Ei Wei., Ting, M. Z., Ibrahim, D.J., Mulvaney

    Published 2017
    “…The traditional ways that used to protect privacy such as Personal Identification Number (PIN) and smart card are getting replaced by the biometric methods due to its high risk for being forgotten and exposure. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    Investigation of dimensionality reduction in a finger vein verification system by Ting, Ei Wei, M. Z., Ibrahim, Mulvaney, D. J.

    Published 2018
    “…Popular methods of protecting access such as Personal Identification Numbers and smart cards are subject to security risks that result from accidental loss or being stolen. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Multispectral palm vein image fusion for contactless palm vein verification system by Soh, Shi Chuan

    Published 2018
    “…SIFT algorithm achieved a reduction in EER rate by 12% in 700 nm, 8% in 850 nm, 7% in 940 nm compared with the SURF algorithm. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7
  8. 8

    Feature and Instances Selection for Nearest Neighbor Classification via Cooperative PSO by Sharifah Sakinah, Syed Ahmad

    Published 2014
    “…The reduction method contains two techniques, namely features reduction and data reduction which are commonly applied to a classification problem. …”
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9
  10. 10

    State-of-the-art in techniques of text digital watermarking: challenges and limitations by Al-Maweri, Nasr Addin Ahmed Salem, Ali, Roslizah, Wan Adnan, Wan Azizun, Ramli, Abd Rahman, Syed Ahmad Abdul Rahman, Sharifah Mumtazah

    Published 2016
    “…Various types of data, including images, videos, audio and text documents, have given cause for the development of different methods for their protection. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Real-time time series error-based data reduction for internet-of-things applications by Wong, Siaw Ling

    Published 2018
    “…There are many time series data reduction methods, ranging from primitive data aggregation such as Rate of Change to sophisticated compression algorithms. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  12. 12

    An Alternative Algorithm for Soft Set Parameter Selection using Special Order by Mohammed, Mohammed Adam Taheir, Wan Maseri, Wan Mohd, Ruzaini, Abdullah Arshah, Mungad, M., Sutoyo, Edi, Chiroma, Haruna

    Published 2015
    “…This paper proposed a parameter reduction algorithm, known as 3C algorithm, to circumvent the false frequent object in reduction. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    Numerical Integration And Data Reduction For Application In Photometry by Chew, Tong Fatt

    Published 2003
    “…In this thesis, an algorithm based on a local interpolation scheme called the Average Angle Method was developed for numerical integration and data reduction of photometric data, and in general, for any data set sharing similar characteristics as the luminous intensity data The new interpolation scheme interpolates discrete data with piecewise cubic polynomials having a CI continuity in the interior. knots. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Protection of the texts using Base64 and MD5 by Taha, Imad, Alahmad, Mohammad, Ahmad, Hanadi

    Published 2012
    “…So using the two protection methods together will increase the security level for protecting the data.…”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Network reconfiguration and control for loss reduction using genetic algorithm by Jawad, Mohamed Hassan Izzaldeen

    Published 2010
    “…In this work a feeder reconfiguration algorithm is presented for the purpose of power loss reduction in distribution networks. …”
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17

    Classification of basal stem rot disease in oil palm using dielectric spectroscopy by Al-Khaled, Al-Fadhl Yahya Khaled

    Published 2018
    “…An analysis was done to see the effect of implementing different data reduction algorithms in classifying BSR disease. …”
    Get full text
    Get full text
    Thesis
  18. 18

    An Improve k-NN Classifier using Similarity Distance Plot-Data Reduction and Dask for Big Datasets by Abdul Muqtasid, Rushdi

    Published 2025
    “…To accommodate big-scale data, the method integrates a parallel computing framework, Dask, during both the reduction and classification processes. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    User authentication for mobile devices using motion sensors based on Moore’s neighborhood / Muhammad Asyraf Akop by Akop, Muhammad Asyraf

    Published 2017
    “…The current methods of authentication are not secure enough to protect data from malicious users. …”
    Get full text
    Get full text
    Student Project
  20. 20