Search Results - (( its application security algorithm ) OR ( some applications mining algorithm ))*

Refine Results
  1. 1

    Named entity recognition using a new fuzzy support vector machine. by Mansouri, Alireza, Affendy, Lilly Suriani, Mamat, Ali

    Published 2008
    “…Some of the Machine learning algorithms used in NER methods are, support vector machine(SVM), Hidden Markov Model, Maximum Entropy Model (MEM) and Decision Tree. …”
    Get full text
    Get full text
    Article
  2. 2

    Efficient prime-based method for interactive mining of frequent patterns. by Mohammad Hossein, Nadimi Shahraki, Mustapha, Norwati, Sulaiman, Md. Nasir, Mamat, Ali

    Published 2011
    “…This is because the appropriate value depends on the type of application and expectation of the user. Moreover, in some real-time applications such as web mining and e-business, finding new correlations between patterns by changing the minimum support threshold is needed. …”
    Get full text
    Get full text
    Article
  3. 3

    The application of neural network data mining algorithm into mixed pixel classification in geographic information system environment by Nanna Suryana, Herman

    Published 2007
    “…This , paper discusses the development of data mining and pattern recognition algorithm to handle the complexity of hyperspectral remote sensing images in Geographical Information Systems environment. …”
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4
  5. 5
  6. 6
  7. 7

    An association rule mining approach in predicting flood areas by Mokhairi, Makhtar, Nur Ashikin, Harun, Azwa, Abdul Aziz, Zahrahtul Amani, Zakaria, Engku Fadzli Hasan, Syed Abdullah, Julaily Aida, Jusoh

    Published 2017
    “…This study focuses on the application of Association rules mining for the flood data in Terengganu. …”
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    Paper Survey And Example Of Collaborative Filtering Implementation In Recommender System by Hanafi, Suryana, Nanna, Hasan Basari, Abd Samad

    Published 2017
    “…Further research can provide newer algorithm to handle cold start problem and sparse data from both text mining and mining computation perspectives.…”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    An artificial immune system model as talent performance predictor / Siti ‘Aisyah Sa’dan, Hamidah Jantan and Mohd Hanapi Abdul Latif by Sa’dan, Siti ‘Aisyah, Jantan, Hamidah, Abdul Latif, Mohd Hanapi

    Published 2016
    “…The objective of this study is to propose a prediction model based on bio-inspired algorithm for talent knowledge discovery through some experiments. …”
    Get full text
    Get full text
    Research Reports
  10. 10

    Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges by Abubakar, Adamu, Jabaka, Shehu, Tijani, Bello Idrith, Zeki, Akram M., Chiroma, Haruna, Usman, Mohammed Joda, Raji, Shakirat, Mahmud, Murni

    Published 2014
    “…Generally RSA algorithm gain a security support because of it’s frequently use in most applications where security of digital data is mostly a concern. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Outlier Detection Technique in Data Mining: A Research Perspective by Mansur, M. O., Md. Sap, Mohd. Noor

    Published 2005
    “…Outlier detection as a branch of data mining has many important applications, and deserves more attention from data mining community. …”
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12
  13. 13
  14. 14

    A study of mobile IP and its security aspects in a LAN environment / Suhaila Che Ismail by Che Ismail, Suhaila

    Published 1998
    “…Each mobile IP agent needs a different application and independently configured. Therefore, a thorough research is to be accomplished in order to produce the mobile IP to the extent of the security features and the algorithm.…”
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16

    Modified Data Encryption Standard Algorithm for Textbased Applications by Mohamed Khmag, Asem Ib.

    Published 2006
    “…Because of its short time execution and higher authentication, using this algorithm will ensure the security for internet applications.…”
    Get full text
    Get full text
    Thesis
  17. 17

    New approach of cryptography algorithm for e- mail applications by Khmag, Asem, Babiker, Elsadig, Ramli, Abd Rahman

    Published 2005
    “…Because of its short time execution and higher authentication, using this algorithm will ensure the security for internet applications.…”
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18

    Utilisation of Exponential-Based Resource Allocation and Competition in Artificial Immune Recognition System by Hormozi, Shahram Golzari

    Published 2011
    “…There has been a rapid growth in using Artificial Immune Systems for applications in data mining and computational intelligence recently. …”
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20

    Adaptive security architecture for protecting RESTful web services in enterprise computing environment by Beer, M.I., Hassan, M.F.

    Published 2018
    “…This SOA implementation does not possess adequate security solutions within it, and its security is completely dependent on network/transport layer security that is obsolete owing to latest web technologies such as Web 2.0 and its upgraded version, Web 3.0. …”
    Get full text
    Get full text
    Article