Search Results - (( certification implementation using algorithm ) OR ( java implementation search algorithm ))
Search alternatives:
- implementation search »
- implementation using »
- java implementation »
- using algorithm »
- certification »
-
1
Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application
Published 2020“…This study aims to compare the performance of Boyer-Moore, Knuth morris pratt, and Horspool algorithms in searching for the meaning of words in the Java-Indonesian dictionary search application in terms of accuracy and processing time. …”
Get full text
Get full text
Journal -
2
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
3
Comparison of performances of Jaya Algorithm and Cuckoo Search algorithm using benchmark functions
Published 2022“…This paper aims to compare the performance of two metaheuristic algorithms which are Jaya Algorithm (JA) and Cuckoo Search (CS) using some common benchmark functions. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
4
Songs Search Using Human Humming Voice
Published 2007Get full text
Get full text
Final Year Project -
5
Visualisation tool to study malaria transmission using network modelling
Published 2014“…In addition, the Hypertext Induced Topical Search (HITS) web search algorithm was adapted to implement a search engine, which uses the bipartite contact network as the input. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
6
User-Device Authentication Model With Digital Certificate For Smartphone User
Published 2024thesis::master thesis -
7
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Even though implementation of such E-Certificate have been implemented around the globe, it has not been implemented for workshops in UiTM. …”
Get full text
Get full text
Thesis -
8
An Educational Tool Aimed at Learning Metaheuristics
Published 2020“…Initially, this tool adopts only Crow Search, Jaya, and Sine Cosine algorithms. But more metaheuristics will be included in future research. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
9
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…This study proposes a car parking management system which applies Dijkstra’s algorithm, Ant Colony Optimization (ACO) and Binary Search Tree (BST) in structuring a guidance system for indoor parking. …”
Get full text
Get full text
Thesis -
10
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
Get full text
Get full text
Thesis -
11
Web-based expert system for material selection of natural fiber- reinforced polymer composites
Published 2015“…Secondly, an expert system using Java programming technology with two tiers of search engine was developed to perform a fast selection of candidate materials in huge volume. …”
Get full text
Get full text
Thesis -
12
Application Of The Blockchain Technology Within Healthcare
Published 2021“…Blockchain technology is an advanced technology that was initially used in the cryptocurrency field and now it has been extensively being implemented in various industries and fields. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
13
An Agent-Based System with Personalization and Intelligent Assistance Services for Facilitating Knowledge Sharing
Published 2006“…The recommendation services provided reduce users burden from manual browsing and searching for knowledge reference resources. KSFaci is embedded in web environment and is implemented using Java Servlet and runs under Apache server. …”
Get full text
Get full text
Thesis -
14
Classification and visualization on eligibility rate of applicant’s LinkedIn account using Naïve Bayes / Nurul Atirah Ahmad
Published 2023“…Thus, this project aims to classify and generate a list of potential job applicants by analyzing various attributes of their LinkedIn accounts, such as title, location, skills, education, language, certification, and experience. This project implements the Naive Bayes algorithm as the classification algorithm. …”
Get full text
Get full text
Thesis -
15
Classification and visualization on eligibility rate of applicant’s LinkedIn account using Naïve Bayes / Nurul Atirah Ahmad, Khyrina Airin Fariza Abu Samah and Nuwairah Aimi Ahmad...
Published 2023“…Thus, this project aims to classify and generate a list of potential job applicants by analyzing various attributes of their LinkedIn accounts, such as title, location, skills, education, language, certification, and years of experience. This project implements the Naive Bayes algorithm as the classification algorithm. …”
Get full text
Get full text
Book Section -
16
Implementation And Performance Analysis Of Machine Learning Models For Detecting Phishing Attacks On Websites
Published 2023“…Then, a machine learning tool is selected to build machine learning models that use three different machine learning algorithms, which are Support Vector Machine, Random Forest, and XGBoost. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
17
Speech dereverberation enhancement
Published 2020Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
18
Traffic congestion detection for smart and control transportation management
Published 2020Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
19
Developing students' mathematical thinking: how far have we came?
Published 2015“…Thus can the large number of students getting As in mathematics for Lower Secondary School Evaluation (PMR) and Malaysian School Certificate (SPM) be used as indicators of the success in developing students' thinking? …”
Get full text
Get full text
Get full text
Inaugural Lecture -
20
Secure multi-authority attribute-based encryption access control with cache-aware scheduling in mobile cloud computing
Published 2021“…For the proposed scheme, the MTTD was very low which is 4.89 minutes, because of the consensus algorithm. Furthermore, by using the cache-aware scheduling, the proposed scheme managed to save 2.18% reads more than those of the existing work solution; this could reduce the time taken to access required data. …”
Get full text
Get full text
Thesis
