Search Results - (( certification implementation function algorithm ) OR ( java application max algorithm ))
Search alternatives:
- implementation function »
- function algorithm »
- java application »
- application max »
- max algorithm »
- certification »
-
1
Batch mode heuristic approaches for efficient task scheduling in grid computing system
Published 2016“…To address these problems, this research proposes three new distributed static batch mode inspired algorithms. The first (proposed) algorithm is based on Min-Min, called Min-Diff, the second algorithm is based on Max-Min, called Max-Average, and the third algorithm is to handle the load balancing, called Efficient Load Balancing (ELB). …”
Get full text
Get full text
Get full text
Thesis -
2
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Even though implementation of such E-Certificate have been implemented around the globe, it has not been implemented for workshops in UiTM. …”
Get full text
Get full text
Thesis -
3
Classification and visualization on eligibility rate of applicant’s LinkedIn account using Naïve Bayes / Nurul Atirah Ahmad
Published 2023“…Thus, this project aims to classify and generate a list of potential job applicants by analyzing various attributes of their LinkedIn accounts, such as title, location, skills, education, language, certification, and experience. This project implements the Naive Bayes algorithm as the classification algorithm. …”
Get full text
Get full text
Thesis -
4
Classification and visualization on eligibility rate of applicant’s LinkedIn account using Naïve Bayes / Nurul Atirah Ahmad, Khyrina Airin Fariza Abu Samah and Nuwairah Aimi Ahmad...
Published 2023“…Thus, this project aims to classify and generate a list of potential job applicants by analyzing various attributes of their LinkedIn accounts, such as title, location, skills, education, language, certification, and years of experience. This project implements the Naive Bayes algorithm as the classification algorithm. …”
Get full text
Get full text
Book Section -
5
Secure multi-authority attribute-based encryption access control with cache-aware scheduling in mobile cloud computing
Published 2021“…In particular, the Certificate Authority is a single entity that leads to a single point of failure, while the Attribute Authority works independently. …”
Get full text
Get full text
Thesis
