Search

Your search keyword '"Anazida Zainal"' showing total 92 results

Search Constraints

Start Over You searched for: Author "Anazida Zainal" Remove constraint Author: "Anazida Zainal" Topic business Remove constraint Topic: business
92 results on '"Anazida Zainal"'

Search Results

1. Cloud customers service selection scheme based on improved conventional cat swarm optimization

2. Lightweight Anomaly Detection Scheme Using Incremental Principal Component Analysis and Support Vector Machine

3. A Distributed Intrusion Detection Scheme for Cloud Computing

4. Deep Kalman Neuro Fuzzy-Based Adaptive Broadcasting Scheme for Vehicular Ad Hoc Network: A Context-Aware Approach

5. An Adaptive Intrusion Detection Scheme for Cloud Computing

7. BTEM: Belief based trust evaluation mechanism for Wireless Sensor Networks

8. Application of Knowledge-oriented Convolutional Neural Network For Causal Relation Extraction In South China Sea Conflict Issues

9. LEACH-CR: Energy Saving Hierarchical Network Protocol Based on Low-Energy Adaptive Clustering Hierarchy for Wireless Sensor Networks

10. News Event Prediction using Causality Approach on South China Sea Conflict

11. Hate Speech and Offensive Language Detection: A New Feature Set with Filter-Embedded Combining Feature Selection

12. An Initial Parameter Search for Rapid Concept Drift Adaptation in Deep Neural Networks

13. Sentiment Analysis of Student’s Opinion on Programming Assessment: Evaluation of Naïve Bayes over Support Vector Machines

14. Detecting Bogus Information Attack in Vehicular Ad Hoc Network: A Context-Aware Approach

15. Security Threats and Challenges to IoT and its Applications: A Review

16. Lightweight Anomaly Detection for Wireless Sensor Networks Based on CCIPCA and One-Class SVM

17. Driving-situation-aware adaptive broadcasting rate scheme for vehicular ad hoc network

18. CLASENTI

19. Optimized Reliable Hybrid Routing Protocol Based Link Stability for Mobile Wireless Networks

20. Multi-Objective Task Scheduling Optimization in Cloud Computing: An Appraisal

21. Intrusion Detection Techniques in Cloud Computing: A Review

22. An optimized skin texture model using gray-level co-occurrence matrix

23. A Hybrid Color Space for Skin Recognition for Real-Time Applications

24. Enhanced Text Stemmer with Noisy Text Normalization for Malay Texts

25. Design Consideration of Malay Text Stemmer Using Structured Approach

26. Ransomware Entities Classification with Supervised Learning for Informal Text

27. Feature Extraction and Selection Method of Cyber-Attack and Threat Profiling in Cybersecurity Audit

28. A Consumer-Oriented Cloud Forensic Process Model

29. Distributed CESVM-DR Anomaly Detection for Wireless Sensor Network

30. Optimal control overhead based multi-metric routing for MANET

31. Word Stemming Methods for the Malay Language: A Review

32. Orthogonal Taguchi-based cat algorithm for solving task scheduling problem in cloud computing

33. A Review on Challenging Issues in Arabic Sentiment Analysis

34. A Robust Keypoint Descriptor Based on Tomographic Image Reconstruction Using Heuristic Genetic Algorithm and Principal Component Analysis Techniques

35. Fraud detection system: A survey

36. Feature Selection Using Multivariate Adaptive Regression Splines in Telecommunication Fraud Detection

37. A Conceptual Scheme for Ransomware Background Knowledge Construction

38. Towards Stemming Error Reduction for Malay Texts

39. A Model for Adaptive and Distributed Intrusion Detection for Cloud Computing

40. Systematic Review on Existing Load Balancing Techniques in Cloud Computing

41. CFaaS: bilaterally agreed evidence collection

42. Content Based Fraudulent Website Detection Using Supervised Machine Learning Techniques

43. An intelligent hybrid approach to encounter coverage holes for wireless sensor nodes deployment in the field

44. Unified approach for operating system comparisons with windows OS case study

45. An effective misbehavior detection model using artificial neural network for vehicular ad hoc network applications

46. Two Stage Integration of GPS, Kinematic Information, and Cooperative Awareness Messages Using Cascaded Kalman Filters

47. Quality of Service (QoS) Task Scheduling Algorithm with Taguchi Orthogonal Approach for Cloud Computing Environment

48. Adaptive Hybrid Geo-casting Routing Protocol for Mobile Ad hoc Networks

49. Cloud scalable multi-objective task scheduling algorithm for cloud computing using cat swarm optimization and simulated annealing

50. Risk tolerance and trust issues in cloud-based E-learning

Catalog

Books, media, physical & digital resources