Search Results - (( java application optimisation algorithm ) OR ( data protection learning algorithm ))
Search alternatives:
- application optimisation »
- optimisation algorithm »
- protection learning »
- learning algorithm »
- java application »
-
1
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…The system is essentially a three-part development, utilising Android, Java Servlets, and Arduino platforms to create an optimised and automated urban-gardening system. …”
Get full text
Get full text
Get full text
Article -
2
Machine learning and deep learning approaches for cybersecurity: a review
Published 2022“…This paper reviewed intrusion detection systems and discussed what types of learning algorithms machine learning and deep learning are using to protect data from malicious behavior. …”
Get full text
Get full text
Get full text
Get full text
Article -
3
Rough-Set-and-Genetic-Algorithm based data mining and Rule Quality Measure to hypothesize distance protective relay operation characteristics from relay event report
Published 2011“…Firstly, the data mining approach of the integrated-Rough-Set-and-Genetic-Algorithm is used to discover the relay CD-decision algorithm. …”
Get full text
Get full text
Article -
4
Discovering decision algorithm of distance protective relay based on rough set theory and rule quality measure
Published 2011“…The relay association rule had also been verified as being a reliable hypothesis of relay operation characteristics that was much sought after and easily understood by the protection engineers. The discovered decision algorithm and association rule from the Rough-Set based data mining had been compared with and successfully validated by those discovered using the benchmarking Decision-Tree based data mining strategy. …”
Get full text
Get full text
Thesis -
5
On protecting data storage in mobile cloud computing paradigm
Published 2014“…However, these passwords and algorithms eventually get cracked by the expert hackers who mostly spend their entire time learning the algorithms and the way to get through the password-protected frameworks. …”
Get full text
Get full text
Get full text
Article -
6
-
7
-
8
Implementation of hashed cryptography algorithm based on cryptography message syntax
Published 2019“…The coding is designed in such a way that there is a malicious attack to destroy the data. The system will automatically protect data and thus retrieve data at the end of the system. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
9
Advanced machine learning algorithm to predict the implication of climate change on groundwater level for protecting aquifer from depletion
Published 2025“…Therefore, the current study aimed to propose an accurate GWL prediction model using advanced machine learning (ML) algorithms in five populated towns, namely Jenderam, Bangi, Beranang, Kajang, and Paya Indah Wetland which are in Selangor, Malaysia. …”
Article -
10
-
11
Web-based expert system for material selection of natural fiber- reinforced polymer composites
Published 2015“…Finally, the developed expert system was deployed over the internet with central interactive interface from the server as a web-based application. As Java is platform independent and easy to be deployed in web based application and accessible through the World Wide Web (www), this expert system can be one stop application for materials selection.…”
Get full text
Get full text
Thesis -
12
Water quality monitoring using machine learning and IoT: a review
Published 2024“…ML algorithms can analyze large volumes of water quality data, enabling data-centric approaches to designing, supervising, simulating, assessing, and refining various water treatment and management systems. …”
Get full text
Get full text
Get full text
Get full text
Article -
13
Machine-learning-based adaptive distance protection relay to eliminate zone-3 protection under-reach problem on statcom-compensated transmission lines
Published 2020“…The BayesNet provides the best integrated MLADR fault classifier model better at a 5 % significance level than other deployed algorithms in the intelligent supervised learning model realization. …”
Get full text
Get full text
Thesis -
14
Balancing data utility versus information loss in data-privacy protection using k-Anonymity
“…The anonymized files go through the classification process by some machine-learning algorithms i.e., Naive Bayes, J48 and neural network in order to check a balance between data anonymity and data utility. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
15
Implementation of machine learning algorithms for streamflow prediction of Dokan dam
Published 2023“…This study aims at comparing the application of deep learning algorithms and conventional machine learning algorithms for predicting reservoir inflow. …”
text::Thesis -
16
Machine learning in botda fibre sensor for distributed temperature measurement
Published 2023“…An alternative method is proposed, utilizing machine learning algorithms. Therefore, this thesis explores the comparative analysis for BOTDA data processing using the six most suited machine learning algorithms. …”
text::Thesis -
17
Distortion-Free Digital Watermarking for Medical Images (Fundus) using Complex- Valued Neural Network
Published 2015“…Once the data become complex, the current algorithms are not capable of handling complex data. …”
Get full text
Get full text
Monograph -
18
Enhancing project completion date prediction using a hybrid model: rule-based algorithm and machine learning algorithm
Published 2025“…The study employs a hybrid predictive model that combines Big Data technologies, Extract Load Transfer (ELT) processes, rule-based algorithms (RBA), machine learning (ML), and Power BI visualizations. …”
Get full text
Get full text
Get full text
Article -
19
Knowledge discovery in distance relay event report: a comparative data-mining strategy of rough set theory with decision tree
Published 2010“…Manually analyzing an event report is also cumbersome due to the tremendous amount of data to be perused. This paper addresses these issues by intelligently divulging the knowledge hidden in the relay recorded event report using a data-mining strategy based on rough set theory and a rule-quality measure under supervised learning to discover the relay decision algorithm and association rule. …”
Get full text
Get full text
Get full text
Article -
20
Enhancement of network security by use machine learning
Published 2019“…The coding is designed in a way that there is an attack of malicious to destroy the data. Because there is a machine-learning scheme in the security, the system have done automatically protect the data and hence the data is recovered at the end of the system. …”
Get full text
Get full text
Get full text
Get full text
Thesis
