Search Results - (( developing consumer private algorithm ) OR ( java implication based algorithm ))

  • Showing 1 - 14 results of 14
Refine Results
  1. 1
  2. 2

    Security in robot operating system (ROS) by using Advanced Encryption Standard (AES) by Nor Alia Syuhada, Shaharudin

    Published 2018
    “…ROS is a distributed framework where nodes publish information that other nodes consume. This model simplifies data communication but poses a major threat because a malicious process could easily interfere the communications, read private messages, or even take over the robots movement. …”
    Get full text
    Get full text
    Get full text
    Undergraduates Project Papers
  3. 3

    An improved diabetes risk prediction framework : An Indonesian case study by Sutanto, Daniel Hartono

    Published 2018
    “…However,there is the issue of noisy dataset detected as incomplete data and the outlier class problem that affects sampling bias.Existing frameworks were deemed difficult in identifying the critical risk factors of diabetes;some of which were considerably inaccurate and consume substantial computation time.The purpose of this study is to develop a suitable framework for predicting diabetes risks.From a complete blood test,the framework can predict and classify the output of either having diabetes risk or no diabetes risk.A Diabetes Risk Prediction Framework (DRPF) was developed from the literature review and case studies were afterwards conducted in three private hospitals in Semarang.Analyses were conducted to find a suitable component of the framework—due to lack of comparison and analysis on the combination of feature selection and classification algorithm.DRPF comprises four main sections: pre-processing,outlier detection,risk weighting,and learning. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5

    Evaluation of Security Metric for Artificial Internet of Things Smart Locking System by Siti Nur Hanani, Mohd Rizal

    Published 2023
    “…This thesis outlines the architectural model of the smart locking system, the design of the face recognition algorithm, and the development of face recognition reader using the Raspberry Pi 3 model B microcontroller. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  6. 6

    Design of an automated data entry system for hand-filled forms by Lim, Woan Ning, Yap, Keem Siah, Khalid, Marxuki, Yusof, Rubiyah

    Published 2000
    “…This data is then entered and stored into databases in government and private organizations manually. Such mode of data entry and storage requires a lot of manpower and is time consuming. …”
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    Design of an automated data entry system for hand-filled forms by Lim, Woan Ning, Yap, Keem Siah, Khalid, Marzuki, Yusof, Rubiyah

    Published 2000
    “…This data is then entered and stored into databases in government and private organizations manually. Such mode of data entry and storage requires a lot of manpower and is time consuming. …”
    Get full text
    Get full text
    Article
  8. 8

    A modified group authentication scheme for machine type communication in LTE/LTE-a networks by Ismail, Haqi Khalid

    Published 2018
    “…The proposed method adopts two efficient algorithms, namely, the Encapsulated Double and Add algorithms which depend on the Tate Pairing form by the bilinear pairing cryptography. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Unsupervised image segmentation for fish egg images by Mohd Yusof, Nur Syazwani Izzati

    Published 2017
    “…First, a total of twenty tilapia egg images with size of 1280 x 1280 is acquired from a private tilapia hatchery, Aquadesa Resources Sdn. …”
    Get full text
    Get full text
    Student Project
  10. 10

    Bipartite graph approach to course timetabling problems / Hafizah A Razak by A Razak, Hafizah

    Published 2009
    “…The prototype is design using constructive heuristic algorithm and colouring the edge of two bipartite graphs. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Machine Learning based Predictive Modelling of Cybersecurity Threats Utilising Behavioural Data by Ting, Tin Tin, Khiew, Jie Xin, Ali Aitizaz, Lee, Kuok Tiung, Teoh, Chong Keat, Hasan Sarwar

    Published 2023
    “…To stop the increase in cybercrimes, everyone, including normal citizens, needs to know how secure they are while using digital appliances. A system is developed to predict the risk of users based on their behaviour when they are online using real-life behavioural data obtained from a private university’s 207 undergraduates. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Evaluation of SongketChain : A Framework to Protect Unique Cultural Product using Blockchain Technology by Muhammad Hassif Imran, Muhammad Harris Irwan, Johari, Abdullah, Adnan Shahid, Khan, Nayeem Ahmad, Khan

    Published 2025
    “…By leveraging both public and private blockchain technologies, SongketChain offers a novel approach to securing pattern rights and supply chain logistics, ensuring that each Songket product's journey from weaver to consumer is documented and verifiable. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Modelling of clinical risk groups (CRGs) classification using FAM by Mohd. Asi, Salina, Saad, Puteh

    Published 2006
    “…Previous studies (in USA and Canada) used claimed base data such Medicare, Medicaid and private insurance provider data for few years back. …”
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14

    Optimum design of sofc based polygeneration system for residential area with vehicle charging or fueling station / Farah Ramadhani by Farah , Ramadhani

    Published 2019
    “…The last step was to develop the optimum size for the system component by using evolutionary and swarm based optimization algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis