Search Results - (( developing internet age algorithm ) OR ( java implication based algorithm ))

  • Showing 1 - 20 results of 20
Refine Results
  1. 1
  2. 2
  3. 3

    Evaluation of the effectiveness of clustering algorithm in retrieving Malay documents / Aminah Mahmood by Mahmood, Aminah

    Published 2004
    “…The main issue in this information age is the efficiency and effectiveness of the retrieval system that can be used by the information provider. …”
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5

    A security payment model for financial payment using mykad by Ahmad Zahari, Nurul Huda

    Published 2011
    “…A system with security technique named Arbitrary Random Security Algorithm (ARSA) and a one-to-one multithreading model need to be developed in order to accelerate the authentication response time of MPM. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    A review on machine learning in smart antenna: methods and techniques by Mohammed Sadiq, Sulaiman, Nasri, Mohd Isa, Maryam, Hamidon, Mohd Nizar

    Published 2022
    “…In this paper, the antenna array and antenna developed for the Internet of Things applications were highlighted. …”
    Get full text
    Get full text
    Article
  8. 8

    Exploring employee working productivity: initial insights from machine learning predictive analytics and visualization / Mohd Norhisham Razali ... [et al.] by Razali, Mohd Norhisham, Ibrahim, Norizuandi, Hanapi, Rozita, Mohd Zamri, Norfarahzila, Abdul Manaf, Syaifulnizam

    Published 2023
    “…The data visualization provided valuable insights into various aspects of employee performance, such as productivity trends before and after the pandemic, departmental performance, internet connectivity's impact on productivity, age-related trends, overtime distribution, and promotion rates. …”
    Get full text
    Get full text
    Article
  9. 9

    Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks by Mohammed Aswad, Firas, Saleh Ahmed,, Ali Mohammed, Ali Majeed Alhammadi, Nafea, Ahmad Khalaf, Bashar, A. Mostafa, Salama

    Published 2023
    “…With the rapid growth of informatics systems’ technology in this modern age, the Internet of Things (IoT) has become more valuable and vital to everyday life in many ways. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks by Mohammed Aswad, Firas, Ahmed, Ali Mohammed Saleh, Majeed Alhammadi, Nafea Ali, Ahmad Khalaf, Bashar, A. Mostafa, Salama

    Published 2023
    “…With the rapid growth of informatics systems’ technology in this modern age, the Internet of Things (IoT) has become more valuable and vital to everyday life in many ways. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks by Mohammed Aswad, Firas, Saleh Ahmed, Ali Mohammed, Ali Majeed Alhammadi, Nafea, Ahmad Khalaf, Bashar, A. Mostafa, Salama

    Published 2023
    “…With the rapid growth of informatics systems’ technology in this modern age, the Internet of Things (IoT) has become more valuable and vital to everyday life in many ways. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12
  13. 13

    Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks by Mohammed Aswad, Firas, Ahmed, Ali Mohammed Saleh, Ali Majeed Alhammadi, Nafea, Bashar Ahmad Khalaf, Bashar Ahmad Khalaf, Salama A. Mostafa, Salama A. Mostafa

    Published 2023
    “…With the rapid growth of informatics systems’ technology in this modern age, the Internet of Things (IoT) has become more valuable and vital to everyday life in many ways. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14
  15. 15
  16. 16

    Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks by Mohammed Aswad, Firas, Mohammed Saleh Ahmed, Ali, Ali Majeed Alhammadi,, Nafea, Ahmad Khalaf, Bashar, Mostafa, Salama A.

    Published 2023
    “…With the rapid growth of informatics systems’ technology in this modern age, the Internet of Things (IoT) has become more valuable and vital to everyday life in many ways. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks by Mohammed Aswad, Firas, Ahmed, Ali Mohammed Saleh, Ali Majeed Alhammadi, Nafea Ali Majeed Alhammadi, Khalaf, Bashar Ahmad, Mostafa, Salama A.

    Published 2023
    “…With the rapid growth of informatics systems’ technology in this modern age, the Internet of Things (IoT) has become more valuable and vital to everyday life in many ways. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18
  19. 19

    Web-based marketing communication to develop brand image and brand equity of higher educational institutions: a structural equation modelling approach by Momen, Md. Abdul, Sultana, Seyama, Haque, A. K. M. Ahasanul

    Published 2019
    “…However, configuring the right mix in the age of social networking sites and various online displays and constantly changing algorithm in search engine optimization have become major challenges today. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Exploring employee working productivity: initial insights from machine learning predictive analytics and visualization by Razali, Mohd Norhisham, Ibrahim, Norizuandi, Hanapi, Rozita, Mohd Zamri, Norfarahzila, Abdul Manaf, Syaifulnizam

    Published 2023
    “…The data visualization provided valuable insights into various aspects of employee performance, such as productivity trends before and after the pandemic, departmental performance, internet connectivity's impact on productivity, age-related trends, overtime distribution, and promotion rates. …”
    Get full text
    Get full text
    Get full text
    Article