Search Results - (( certification implementation based algorithm ) OR ( java adaptation optimization algorithm ))
Search alternatives:
- adaptation optimization »
- implementation based »
- java adaptation »
- certification »
-
1
Parallel distributed genetic algorithm development based on microcontrollers framework
Published 2023Conference paper -
2
Digital Certificate-based Authentication Model For Enhanced Smartphone Security
Published 2025journal::journal article -
3
Digital certificate-based authentication model for enhanced smartphone security / A. H. Azni, Sakiinah Altaf Hussain and Najwa Hayaati Mohd Alwi
Published 2025“…Aimed at addressing smartphone users' authentication needs, the model operates through three phases: Registration, Digital Certificate, and Authentication, each bolstering data protection through digital certificate-based authentication. …”
Get full text
Get full text
Get full text
Article -
4
Application Of The Blockchain Technology Within Healthcare
Published 2021“…Finally, the constructed predictive model is implemented along with the proposed application, which connects all groups of participants with the blockchain-based EMR system.…”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
5
Anfis Modelling On Diabetic Ketoacidosis For Unrestricted Food Intake Conditions
Published 2017“…The project has also implemented the optimization process onto the proposed ANFIS model through the hybrid of Genetic Algorithm on the fuzzy membership function of the ANFIS model. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
6
Classification and visualization on eligibility rate of applicant’s LinkedIn account using Naïve Bayes / Nurul Atirah Ahmad
Published 2023“…Thus, this project aims to classify and generate a list of potential job applicants by analyzing various attributes of their LinkedIn accounts, such as title, location, skills, education, language, certification, and experience. This project implements the Naive Bayes algorithm as the classification algorithm. …”
Get full text
Get full text
Thesis -
7
Classification and visualization on eligibility rate of applicant’s LinkedIn account using Naïve Bayes / Nurul Atirah Ahmad, Khyrina Airin Fariza Abu Samah and Nuwairah Aimi Ahmad...
Published 2023“…Thus, this project aims to classify and generate a list of potential job applicants by analyzing various attributes of their LinkedIn accounts, such as title, location, skills, education, language, certification, and years of experience. This project implements the Naive Bayes algorithm as the classification algorithm. …”
Get full text
Get full text
Book Section -
8
Implementation And Performance Analysis Of Machine Learning Models For Detecting Phishing Attacks On Websites
Published 2023“…To prevent users from falling victim to phishing websites, a machine-learning-based solution is proposed in this project. This project aims to detect phishing websites by implementing a tool that is built from a machine-learning model. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
9
Impact of Computational Thinking and Computer Science (CTCS) Teaching Technique at Seleceted Schools in Sarawak : A Qualitative Analysis
Published 2023“…Between 2017 and 2020, the Faculty of Computer Science and Information Technology (FCSIT), UNIMAS conducted teaching certificate program for teachers, and outreach program based on digital making, programming, and robotics for students to increase their readiness in digital knowledge through computational thinking and computer science (CTCS). …”
Get full text
Get full text
Get full text
Proceeding -
10
Traffic congestion detection for smart and control transportation management
Published 2020Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
11
Developing students' mathematical thinking: how far have we came?
Published 2015“…As for assessment, as long as the 'teaching for examination' culture is strong and the right concept of school-based assessment is not implemented, not much change will happen in classroom instruction and the aspiration to get our students to think mathematically will remain far from reality.…”
Get full text
Get full text
Get full text
Inaugural Lecture -
12
Secure multi-authority attribute-based encryption access control with cache-aware scheduling in mobile cloud computing
Published 2021“…The proposed Multi-Authority Attribute-Based Encryption with Cache-Aware Scheduling for Mobile Cloud Access Control in Mobile Cloud Computing environment analysis of the theoretical and implemented results demonstrated that the scheme performed better compared to the previous work solution in terms of availability and integrity. …”
Get full text
Get full text
Thesis
