Search Results - (( develop readiness based algorithm ) OR ( java visualisation using algorithm ))

Refine Results
  1. 1

    Visualisation tool to study malaria transmission using network modelling by Wong,, Ji Yeh

    Published 2014
    “…Java was used to implement the visualisation tool. …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  2. 2

    An indoor based push notification for location-based marketing using bluetooth smart ready technology / Nur Farehah Alias by Alias, Nur Farehah

    Published 2017
    “…Therefore, this project has proposed a method called token based alert notification. There are three algorithm developed for token based alert notification which is tokenization algorithm, token matching algorithm and item identification algorithm. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4
  5. 5

    Lattice-based cryptography: the dots that provide information security by Arif Mandangan, Hailiza Kamarulhaili, Muhammad Asyraf Asbullah, Che Haziqah Che Hussin

    Published 2023
    “…Alternatively, most of the current cryptographic schemes are developed based on hard mathematical problems believed to be as unaffected by Shor’s quantum algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceedings
  6. 6
  7. 7

    Even-odd scheduling based energy efficient routing for wireless sensor network (WSN) / Muhammad Zafar Iqbal Khan by Khan, Muhammad Zafar Iqbal

    Published 2022
    “…Several routing protocols have been developed and proposed in the literature for the development of energy-efficient routing strategies of Wireless Sensor Networks. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Modified Data Encryption Standard Algorithm for Textbased Applications by Mohamed Khmag, Asem Ib.

    Published 2006
    “…The purpose of this thesis is to introduce and demonstrate a new algorithm for Internet and e-mail security. The proposed algorithm was developed based on the combination of symmetric and asymmetric algorithm whereas the length of the key and digital signature was considered. …”
    Get full text
    Get full text
    Thesis
  9. 9

    New approach of cryptography algorithm for e- mail applications by Khmag, Asem, Babiker, Elsadig, Ramli, Abd Rahman

    Published 2005
    “…The purpose of this paper is to introduce and demonstrate a new algorithm for Internet and e-mail security. The purposed algorithm was developed based on the combination of symmetric and asymmetric algorithm whereas the length of the key and digital signature was considered. …”
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10
  11. 11

    Self-driving car with Artificial Intelligence (AI) technology / Asrul Amin Mohd Isa ... [et al.] by Mohd Isa, Asrul Amin, Hasnan, Aimuni Aina, Hashim, Zuyyin, Othman, Jamal

    Published 2023
    “…The autonomous vehicle technology is highly developed and ready for commercial deployment. The self-driving car is a type of autonomous vehicle that can drive autonomously based on Artificial Intelligence (AI). …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Enhancement load balancing in failover web server by using HTTP-response status techniques with pfsense opensource / Muhammad Hafiz Ramli by Ramli, Muhammad Hafiz

    Published 2020
    “…In conclusion, based on the ten (10) scenario, the failure error 404 and 500 occur in ICMP based monitoring, which in the network layer while congestion issue in HTTP based monitoring, which is in the application layer. …”
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14
  15. 15
  16. 16

    Personalized Recommendation Classification Model of Students’ Social Well-being Based on Personality Trait Determinants Using Machine Learning Algorithms by Rochin Demong, Nur Atiqah, Shahrom, Melissa, Abdul Rahim, Ramita, Omar, Emi Normalina, Yahya, Mornizan

    Published 2023
    “…After analyzing the results of all algorithms, it was determined that the IBk and Randomizable Filtered Classifier algorithms give the best accuracy on social well-being readiness, with a comparable percentage value of 91.26%. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Integrated Solar-IoT monitoring and predictive maintenance systems for irrigation (S-IoTP) / Hasyiya Karimah Adli ... [et al.] by Adli, Hasyiya Karimah, Ku Husin, Ku Azmie, Wan Salihin Wong, Khairul Nizar Syazwan, Remli, Muhammad Akmal

    Published 2021
    “…To date, the technology readiness level of the S-IoTP is TRL 5, which is in the stage of development and it is validated in relevant environment.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18

    Developing Android Application To Guide Lean Six Sigma PDCA Project by Ong, Sin Joo

    Published 2018
    “…Mobile application grows rapidly with abundant of application development. This research aims to develop an Android-based approach to provide guidelines of PDCA. …”
    Get full text
    Get full text
    Monograph
  19. 19

    Towards a multispectral imaging system for spatial mapping of chemical composition in fresh-cut pineapple (Ananas comosus) by Mollazade, Kaveh, Hashim, Norhashila, Zude-Sasse, Manuela

    Published 2023
    “…Ranking and uncorrelatedness (based on ReliefF algorithm) and subset selection (based on CfsSubset algorithm) approaches were applied to find the most informative wavelengths in which bandpass optical filters or light sources are commercially available. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20