Search Results - (( java application optimisation algorithm ) OR ( data protection learning algorithm ))

Refine Results
  1. 1

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…The system is essentially a three-part development, utilising Android, Java Servlets, and Arduino platforms to create an optimised and automated urban-gardening system. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Machine learning and deep learning approaches for cybersecurity: a review by Halbouni, Asmaa Hani, Gunawan, Teddy Surya, Habaebi, Mohamed Hadi, Halbouni, Murad, Kartiwi, Mira, Ahmad, Robiah

    Published 2022
    “…This paper reviewed intrusion detection systems and discussed what types of learning algorithms machine learning and deep learning are using to protect data from malicious behavior. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  3. 3
  4. 4

    Discovering decision algorithm of distance protective relay based on rough set theory and rule quality measure by Othman, Mohamad Lutfi

    Published 2011
    “…The relay association rule had also been verified as being a reliable hypothesis of relay operation characteristics that was much sought after and easily understood by the protection engineers. The discovered decision algorithm and association rule from the Rough-Set based data mining had been compared with and successfully validated by those discovered using the benchmarking Decision-Tree based data mining strategy. …”
    Get full text
    Get full text
    Thesis
  5. 5

    On protecting data storage in mobile cloud computing paradigm by Abdalla , Al-kindy Athman, Pathan, Al-Sakib Khan

    Published 2014
    “…However, these passwords and algorithms eventually get cracked by the expert hackers who mostly spend their entire time learning the algorithms and the way to get through the password-protected frameworks. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6
  7. 7
  8. 8

    Implementation of hashed cryptography algorithm based on cryptography message syntax by Ali, Mohammed Ahnaf

    Published 2019
    “…The coding is designed in such a way that there is a malicious attack to destroy the data. The system will automatically protect data and thus retrieve data at the end of the system. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    Advanced machine learning algorithm to predict the implication of climate change on groundwater level for protecting aquifer from depletion by Ahmed Osman A.I., Latif S.D., Wee Boo K.B., Ahmed A.N., Huang Y.F., El-Shafie A.

    Published 2025
    “…Therefore, the current study aimed to propose an accurate GWL prediction model using advanced machine learning (ML) algorithms in five populated towns, namely Jenderam, Bangi, Beranang, Kajang, and Paya Indah Wetland which are in Selangor, Malaysia. …”
    Article
  10. 10
  11. 11

    Web-based expert system for material selection of natural fiber- reinforced polymer composites by Ahmed Ali, Basheer Ahmed

    Published 2015
    “…Finally, the developed expert system was deployed over the internet with central interactive interface from the server as a web-based application. As Java is platform independent and easy to be deployed in web based application and accessible through the World Wide Web (www), this expert system can be one stop application for materials selection.…”
    Get full text
    Get full text
    Thesis
  12. 12

    Water quality monitoring using machine learning and IoT: a review by Hasan, Tahsin Fuad, Kabbashi, Nassereldeen Ahmed, Saleh, Tanveer, Alam, Md. Zahangir, Abd Wahab, Mohd Firdaus, Nour, Abdurahman Hamid

    Published 2024
    “…ML algorithms can analyze large volumes of water quality data, enabling data-centric approaches to designing, supervising, simulating, assessing, and refining various water treatment and management systems. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Machine-learning-based adaptive distance protection relay to eliminate zone-3 protection under-reach problem on statcom-compensated transmission lines by Aker, Elhadi Emhemed Alhaaj Ammar

    Published 2020
    “…The BayesNet provides the best integrated MLADR fault classifier model better at a 5 % significance level than other deployed algorithms in the intelligent supervised learning model realization. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Balancing data utility versus information loss in data-privacy protection using k-Anonymity by Esmeel, Thamer Khalil, Hasan, Md Munirul, Kabir, Muhammad Nomani, Ahmad, Firdaus

    “…The anonymized files go through the classification process by some machine-learning algorithms i.e., Naive Bayes, J48 and neural network in order to check a balance between data anonymity and data utility. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15

    Implementation of machine learning algorithms for streamflow prediction of Dokan dam by Sarmad Dashti Latif, Mr.

    Published 2023
    “…This study aims at comparing the application of deep learning algorithms and conventional machine learning algorithms for predicting reservoir inflow. …”
    text::Thesis
  16. 16

    Machine learning in botda fibre sensor for distributed temperature measurement by Nur Dalilla binti Nordin

    Published 2023
    “…An alternative method is proposed, utilizing machine learning algorithms. Therefore, this thesis explores the comparative analysis for BOTDA data processing using the six most suited machine learning algorithms. …”
    text::Thesis
  17. 17
  18. 18

    Enhancing project completion date prediction using a hybrid model: rule-based algorithm and machine learning algorithm by Abd Rahman, Mohd Shahrizan, Jamaludin, Nor Azliana Akmal, Zainol, Zuraini, Tengku Sembok, Tengku Mohd

    Published 2025
    “…The study employs a hybrid predictive model that combines Big Data technologies, Extract Load Transfer (ELT) processes, rule-based algorithms (RBA), machine learning (ML), and Power BI visualizations. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Knowledge discovery in distance relay event report: a comparative data-mining strategy of rough set theory with decision tree by Othman, Mohammad Lutfi, Aris, Ishak, Abdullah, Senan Mahmood, Ali, Md. Liakot, Othman, Mohammad Ridzal

    Published 2010
    “…Manually analyzing an event report is also cumbersome due to the tremendous amount of data to be perused. This paper addresses these issues by intelligently divulging the knowledge hidden in the relay recorded event report using a data-mining strategy based on rough set theory and a rule-quality measure under supervised learning to discover the relay decision algorithm and association rule. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Enhancement of network security by use machine learning by Hasan, Ahmed Raheem

    Published 2019
    “…The coding is designed in a way that there is an attack of malicious to destroy the data. Because there is a machine-learning scheme in the security, the system have done automatically protect the data and hence the data is recovered at the end of the system. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis