Search Results - (( developing tutorial learning algorithm ) OR ( java communication issues algorithm ))
Search alternatives:
- communication issues »
- developing tutorial »
- learning algorithm »
- java communication »
- tutorial learning »
- issues algorithm »
-
1
-
2
Parallel distributed genetic algorithm development based on microcontrollers framework
Published 2023Conference paper -
3
A cluster-based hybrid replica control protocol for high availability in data grid
Published 2019“…Another proposed algorithm is replica placement algorithm which selects and places only one replica in each cluster. …”
Get full text
Get full text
Thesis -
4
Interactive learning package for artificial neural network (Demonstration Module) / Camellia Mohd Kamal
Published 2004“…Interactive Learning Package for Artificial Neural Network (Demonstration Module) is a learning package that allow the users to learn and enhance the understanding of the ANN subject in more detailed way and apply in the demonstration parts. …”
Get full text
Get full text
Thesis -
5
Teaching and learning via chatbots with immersive and machine learning capabilities
Published 2019“…Most of the learning courseware/systems to learn Java programming language are merely repository of static and monotonous contents such as hyperlinked online tutorials, video lectures, etc. …”
Get full text
Get full text
Conference or Workshop Item -
6
Implementing case-based reasoning approach to framework documentation
Published 2023“…Traditional documentation approaches include tutorials, reference manuals, design patterns, cookbooks, and minimalist. …”
Conference paper -
7
Securing cloud data system (SCDS) for key exposure using AES algorithm
Published 2021“…The AES algorithm has its own structure to encrypt and decrypt sensitive data that make the attackers difficult to get the real data when encrypting by AES algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
8
-
9
Secure E-Voting With Blind Signature
Published 2003“…The provider, which is an open source library, is used to provide the secure communication channel. The voter’s private key for digital signature is protected by using password-based encryption with SHA and Twofish-CBC algorithm so that only valid voter can use it.…”
Get full text
Get full text
Conference or Workshop Item -
10
Learner’s emotion prediction using production rules classification algorithm through brain computer interface tool
Published 2018“…The reliable relationship between EEG signals of the attention and meditation and their impact towards the positive and negative emotions among children while learning illustrates the potentials in detecting mental states which are relevant to tutoring such as comprehension, engagement and learning impact. …”
Get full text
Get full text
Thesis -
11
Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC
Published 2021“…A new multi-factor authentication scheme is designed using the AES-ECC algorithm based on Kerberos workflow to establish secure, efficient, and lightweight communication between the user and the targeted IIoT devices to avoid the issues. …”
Get full text
Get full text
Thesis -
12
Mobile application for real time baby sign language recognition using YOLOv8 / Siti Aishah Idris and Ahmad Firdaus Ahmad Fadzil
Published 2024“…The model will be designed and developed using a deep learning algorithm, which is YOLOv8, the latest version of YOLO. …”
Get full text
Get full text
Get full text
Article
