Search Results - (( certification implementation using algorithm ) OR ( java implementation plan algorithm ))
Search alternatives:
- implementation using »
- java implementation »
- implementation plan »
- using algorithm »
- plan algorithm »
- certification »
-
1
User-Device Authentication Model With Digital Certificate For Smartphone User
Published 2024thesis::master thesis -
2
A web-based implementation of k-means algorithms
Published 2022“…The project was planned using the Kanban development methodology, and was built using HTML, CSS, JavaScript, Django, NumPy and pandas. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
3
Smart appointment organizer for mobile application / Mohd Syafiq Adam
Published 2009“…The development of this project is based on a framework of 5 main stages: planning, analysis, design, implementation and testing. …”
Get full text
Get full text
Thesis -
4
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…This methodology consist of Requirement and Planning, Design, Construction, Testing and Implementation. …”
Get full text
Get full text
Thesis -
5
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Even though implementation of such E-Certificate have been implemented around the globe, it has not been implemented for workshops in UiTM. …”
Get full text
Get full text
Thesis -
6
Heavy Transportation Shortest Route using Dijkstra’s algorithm (HETRO) / Nurul Aqilah Ahmad Nezer
Published 2017“…The development tools used in developing this project is NetBeans by using Java for the implementation of the coding. The methodology that used for developing this system is the Dijkstra’s algorithm. …”
Get full text
Get full text
Thesis -
7
Path planning for unmanned aerial vehicle (UAV) using rotated accelerated method in static outdoor environment
Published 2021“…In this study, a fast iterative method known as Rotated Successive Over-Relaxation (RSOR) is introduced. The algorithm is implemented in a self-developed 2D Java tool, UAV Planner. …”
Get full text
Get full text
Get full text
Get full text
Article -
8
Implementation of RIO in UMJaNetSim / Chan Chin We
Published 2004“…In this project, I will do some research on the recent TCP congestion control and avoidance mechanisms and implement one of the mechanisms into the Java Network Simulator (JaNetSim). …”
Get full text
Get full text
Thesis -
9
Songs Search Using Human Humming Voice
Published 2007“…The scopes for this project are human humming voice, voice capture in WA V format, songs database, and MIDI file comparing algorithm. Methodologies used in this system are based on system analysis and design methodology comprising planning, analysis, design and implementation. …”
Get full text
Get full text
Final Year Project -
10
Smart student timetable planner
Published 2025“…To achieve these objectives, the system adopts the Rapid Application Development (RAD) methodology, ensuring iterative design, prototyping, and user feedback integration throughout the process. The system is implemented using Node.js with Express for server-side development, HTML, CSS, and JavaScript for the frontend, and Socket.IO for real-time collaboration. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
11
Application Of The Blockchain Technology Within Healthcare
Published 2021“…Blockchain technology is an advanced technology that was initially used in the cryptocurrency field and now it has been extensively being implemented in various industries and fields. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
12
Classification and visualization on eligibility rate of applicant’s LinkedIn account using Naïve Bayes / Nurul Atirah Ahmad
Published 2023“…Thus, this project aims to classify and generate a list of potential job applicants by analyzing various attributes of their LinkedIn accounts, such as title, location, skills, education, language, certification, and experience. This project implements the Naive Bayes algorithm as the classification algorithm. …”
Get full text
Get full text
Thesis -
13
Classification and visualization on eligibility rate of applicant’s LinkedIn account using Naïve Bayes / Nurul Atirah Ahmad, Khyrina Airin Fariza Abu Samah and Nuwairah Aimi Ahmad...
Published 2023“…Thus, this project aims to classify and generate a list of potential job applicants by analyzing various attributes of their LinkedIn accounts, such as title, location, skills, education, language, certification, and years of experience. This project implements the Naive Bayes algorithm as the classification algorithm. …”
Get full text
Get full text
Book Section -
14
Implementation And Performance Analysis Of Machine Learning Models For Detecting Phishing Attacks On Websites
Published 2023“…Then, a machine learning tool is selected to build machine learning models that use three different machine learning algorithms, which are Support Vector Machine, Random Forest, and XGBoost. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
15
Speech dereverberation enhancement
Published 2020Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
16
Traffic congestion detection for smart and control transportation management
Published 2020Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
17
Fuzzy-based multi-agent approach for reliability assessment and improvement of power system protection
Published 2015“…The simulation results for the first and second models are done using the data obtained from Malaysia distribution network (DISCO-Net) and 69 bus test system that were implemented using Java Agent Development Framework package software. …”
Get full text
Get full text
Thesis -
18
Developing students' mathematical thinking: how far have we came?
Published 2015“…Thus can the large number of students getting As in mathematics for Lower Secondary School Evaluation (PMR) and Malaysian School Certificate (SPM) be used as indicators of the success in developing students' thinking? …”
Get full text
Get full text
Get full text
Inaugural Lecture -
19
Secure multi-authority attribute-based encryption access control with cache-aware scheduling in mobile cloud computing
Published 2021“…For the proposed scheme, the MTTD was very low which is 4.89 minutes, because of the consensus algorithm. Furthermore, by using the cache-aware scheduling, the proposed scheme managed to save 2.18% reads more than those of the existing work solution; this could reduce the time taken to access required data. …”
Get full text
Get full text
Thesis
