Search Results - (( developing tutorial learning algorithm ) OR ( wave applications security algorithm ))
Search alternatives:
- developing tutorial »
- learning algorithm »
- tutorial learning »
- wave applications »
-
1
-
2
Interactive learning package for artificial neural network (Demonstration Module) / Camellia Mohd Kamal
Published 2004“…Interactive Learning Package for Artificial Neural Network (Demonstration Module) is a learning package that allow the users to learn and enhance the understanding of the ANN subject in more detailed way and apply in the demonstration parts. …”
Get full text
Get full text
Thesis -
3
-
4
Secured mobile transaction using NFC Technology: Top-Up printing system
Published 2011“…As proof of concept, a Top-up printing system is developed and for interaction with the web interface, an ACR 100 Reader with ACOS3 SIM card is used. As for the security measurement, MD5 algorithm is implemented to accept the system authorization. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
5
Teaching and learning via chatbots with immersive and machine learning capabilities
Published 2019“…Most of the learning courseware/systems to learn Java programming language are merely repository of static and monotonous contents such as hyperlinked online tutorials, video lectures, etc. …”
Get full text
Get full text
Conference or Workshop Item -
6
NFC secured online transaction in mobile computing business
Published 2012“…As proof of concept, a Top-up printing system is developed and for interaction with contactless interface, an ACR 100 Reader with ACOS3 SIM card is used. As for the security measurement, MD5 algorithm is implemented to process the system authorization. …”
Get full text
Get full text
Get full text
Article -
7
Implementing case-based reasoning approach to framework documentation
Published 2023“…Traditional documentation approaches include tutorials, reference manuals, design patterns, cookbooks, and minimalist. …”
Conference paper -
8
Access control and classifier-based blockchain technology in e-healthcare applications
Published 2023Book Chapter -
9
Dual authentication for bluetooth connection
Published 2014Get full text
Get full text
Get full text
Article -
10
Learner’s emotion prediction using production rules classification algorithm through brain computer interface tool
Published 2018“…The reliable relationship between EEG signals of the attention and meditation and their impact towards the positive and negative emotions among children while learning illustrates the potentials in detecting mental states which are relevant to tutoring such as comprehension, engagement and learning impact. …”
Get full text
Get full text
Thesis -
11
Implementation and integration of HF messaging system with cryptographic features
Published 2006“…In order to keep information secured while transmission, the system was incorporated with cipher algorithms. …”
Get full text
Get full text
Get full text
Thesis -
12
-
13
Implementation of a Symmetric Chaotic Encryption Scheme
Published 2004Get full text
Get full text
Final Year Project -
14
-
15
Optical soliton perturbation with quadratic-cubic nonlinearity / Mir Asma
Published 2020“…Solitons can be defined as wave packets that can travel undistorted across long distances even transcontinental and transoceanic. …”
Get full text
Get full text
Get full text
Thesis -
16
-
17
-
18
Handover Management Over Dual Connectivity In 5g Technology With Future Ultra-dense Mobile Heterogeneous Networks: A Review
Published 2024journal::journal article -
19
-
20
