Search Results - (( developing consumer private algorithm ) OR ( java implication based algorithm ))
Search alternatives:
- developing consumer »
- private algorithm »
- implication based »
- consumer private »
- java implication »
-
1
-
2
Security in robot operating system (ROS) by using Advanced Encryption Standard (AES)
Published 2018“…ROS is a distributed framework where nodes publish information that other nodes consume. This model simplifies data communication but poses a major threat because a malicious process could easily interfere the communications, read private messages, or even take over the robots movement. …”
Get full text
Get full text
Get full text
Undergraduates Project Papers -
3
An improved diabetes risk prediction framework : An Indonesian case study
Published 2018“…However,there is the issue of noisy dataset detected as incomplete data and the outlier class problem that affects sampling bias.Existing frameworks were deemed difficult in identifying the critical risk factors of diabetes;some of which were considerably inaccurate and consume substantial computation time.The purpose of this study is to develop a suitable framework for predicting diabetes risks.From a complete blood test,the framework can predict and classify the output of either having diabetes risk or no diabetes risk.A Diabetes Risk Prediction Framework (DRPF) was developed from the literature review and case studies were afterwards conducted in three private hospitals in Semarang.Analyses were conducted to find a suitable component of the framework—due to lack of comparison and analysis on the combination of feature selection and classification algorithm.DRPF comprises four main sections: pre-processing,outlier detection,risk weighting,and learning. …”
Get full text
Get full text
Get full text
Thesis -
4
Digital Quran With Storage Optimization Through Duplication Handling And Compressed Sparse Matrix Method
Published 2024thesis::doctoral thesis -
5
Evaluation of Security Metric for Artificial Internet of Things Smart Locking System
Published 2023“…This thesis outlines the architectural model of the smart locking system, the design of the face recognition algorithm, and the development of face recognition reader using the Raspberry Pi 3 model B microcontroller. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Design of an automated data entry system for hand-filled forms
Published 2000“…This data is then entered and stored into databases in government and private organizations manually. Such mode of data entry and storage requires a lot of manpower and is time consuming. …”
Get full text
Get full text
Conference or Workshop Item -
7
Design of an automated data entry system for hand-filled forms
Published 2000“…This data is then entered and stored into databases in government and private organizations manually. Such mode of data entry and storage requires a lot of manpower and is time consuming. …”
Get full text
Get full text
Article -
8
A modified group authentication scheme for machine type communication in LTE/LTE-a networks
Published 2018“…The proposed method adopts two efficient algorithms, namely, the Encapsulated Double and Add algorithms which depend on the Tate Pairing form by the bilinear pairing cryptography. …”
Get full text
Get full text
Thesis -
9
Unsupervised image segmentation for fish egg images
Published 2017“…First, a total of twenty tilapia egg images with size of 1280 x 1280 is acquired from a private tilapia hatchery, Aquadesa Resources Sdn. …”
Get full text
Get full text
Student Project -
10
Bipartite graph approach to course timetabling problems / Hafizah A Razak
Published 2009“…The prototype is design using constructive heuristic algorithm and colouring the edge of two bipartite graphs. …”
Get full text
Get full text
Thesis -
11
Machine Learning based Predictive Modelling of Cybersecurity Threats Utilising Behavioural Data
Published 2023“…To stop the increase in cybercrimes, everyone, including normal citizens, needs to know how secure they are while using digital appliances. A system is developed to predict the risk of users based on their behaviour when they are online using real-life behavioural data obtained from a private university’s 207 undergraduates. …”
Get full text
Get full text
Get full text
Get full text
Article -
12
Evaluation of SongketChain : A Framework to Protect Unique Cultural Product using Blockchain Technology
Published 2025“…By leveraging both public and private blockchain technologies, SongketChain offers a novel approach to securing pattern rights and supply chain logistics, ensuring that each Songket product's journey from weaver to consumer is documented and verifiable. …”
Get full text
Get full text
Get full text
Get full text
Article -
13
Modelling of clinical risk groups (CRGs) classification using FAM
Published 2006“…Previous studies (in USA and Canada) used claimed base data such Medicare, Medicaid and private insurance provider data for few years back. …”
Get full text
Get full text
Conference or Workshop Item -
14
Optimum design of sofc based polygeneration system for residential area with vehicle charging or fueling station / Farah Ramadhani
Published 2019“…The last step was to develop the optimum size for the system component by using evolutionary and swarm based optimization algorithm. …”
Get full text
Get full text
Get full text
Thesis
