Search Results - (( developing halal function algorithm ) OR ( java based verification algorithm ))
Search alternatives:
- verification algorithm »
- function algorithm »
- based verification »
- developing halal »
- java »
-
1
Design of Improved Stream Cipher Algorithms for GSM Communication
Published 2024thesis::master thesis -
2
The reliability of halal product transportation using GPS tracking system
Published 2016“…A functional prototype device with a web based interface for reporting function was completely built and tested in different kind of situation. …”
Get full text
Get full text
Get full text
Article -
3
Real time traceability module for halal logistic transportation using GPS and geofence technique
Published 2016“…The verification and simulation report illustrate that the module and improved algorithm has successfully been executed to deliver a report of tracking that is in accordance with the requirements of administering Halal goods. …”
Get full text
Get full text
Thesis -
4
Halal restaurant finder / Khairol Azahar Ramli
Published 2014“…For this application, a survey has been conducted before and after the development of this application. The outcomes of the survey, most of the respondents are interested in Halal restaurant application and they are very satisfied with the function and interface design of Halal Restaurant Finder application. …”
Get full text
Get full text
Thesis -
5
The identification of alcohol percentage limit in halal food using fuzzy logic
Published 2021“…This algorithm and basic framework will be the first step in developing a user-friendly tool that will later benefit the consumer as well as function as an auditor especially in order to control the alcohol content in halal food and beverages.…”
Get full text
Get full text
Get full text
Book Chapter -
6
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…For this research, several set of robots by using Lego has been developed and it uses LeJos and C programming techniques as a platform. A Java-based robot development tool has been set up as alternative programming methods incorporating LeJos and the controller. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
7
Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC
Published 2021“…The offline scheme utilizes a Time-based One-Time Password (TOTP) algorithm to allow users to authenticate to the vehicle without needing an Internet connection once they have registered online when Internet access is available. …”
Get full text
Get full text
Thesis -
8
A framework of test case prioritisation in regression testing using particle swarm-artificial bee colony algorithm
Published 2024“…The developed framework, grounded in fault-based testing theory, comprises three key components: inputs, prioritization factors, and a prioritization algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
9
An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications
Published 2015“…This research work was limited to Java based web applications. In future research, the method can be extended to include other programming languages as well as other similar web application security vulnerabilities.…”
Get full text
Get full text
Thesis
