Search Results - (( java implication based algorithm ) OR ( using certification from algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…User who owes an E-Certificate is able to retrieve from a web page and can be printed out. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Secure file sharing with public key infrastructure (PKI) enablement / Noor Azlina Ismail @ Hassan by Ismail @ Hassan, Noor Azlina

    Published 2015
    “…As for digital storage, USB token with authentication mechanism can be used to protect the digital certificate from being stolen by other people as future recommendation.…”
    Get full text
    Get full text
    Thesis
  5. 5

    Price prediction model of green building based on machine learning algorithms / Nur Syafiqah Jamil by Jamil, Nur Syafiqah

    Published 2021
    “…Meanwhile, experiments using five common algorithms, Random Forest Regressor Model outperforms four (4) other algorithms in predicting the price of green building condominium, by training and validating the data-set using Split approach. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    The Effect of Entry Qualifications and Gender Towards Student Performance by M. M., Noor, K., Kadirgama, M. R. M., Rejab, M. Y., Taib

    Published 2009
    “…Entries qualifications are from Foundation Program, Higher Certificate of Malaysian Education (STPM) and Diploma Certificate. …”
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    A framework of enhanced authentication for PDF textual documents using Zigzag-LSB embedding algorithm by Nur Alya Afikah, Usop

    Published 2024
    “…By dispersing the numbered original data as far away from the original locations as feasible, the strategies made use of specific numbering systems. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Household overspending model amongst B40, M40 and T20 using classification algorithm by Zulaiha Ali, Othman, Azuraliza, Abu Bakar, Nor Samsiah, Sani, Jamaludin, Sallim

    Published 2020
    “…Availability of 4 million household expenditure records obtained from the survey conducted in 2016 by the Department of Statistics Malaysia eases the aim of this study to develop a household overspending model by using machine learning. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Classification and visualization on eligibility rate of applicant’s LinkedIn account using Naïve Bayes / Nurul Atirah Ahmad by Ahmad, Nurul Atirah

    Published 2023
    “…Thus, this project aims to classify and generate a list of potential job applicants by analyzing various attributes of their LinkedIn accounts, such as title, location, skills, education, language, certification, and experience. This project implements the Naive Bayes algorithm as the classification algorithm. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Exploring classification for sentiment analysis from halal based tweets by Setik, Roziyani, Raja Lope Ahmad, Raja Mohd Tariqi, Marjudi, Suziyanti

    Published 2021
    “…It usually assigns a polarity of “positive”, “negative” or “neutral”. It uses an algorithmic technique to capture people's thoughts, sentiments, and emotions by incorporating Natural Language Processing and Machine Learning technology. …”
    Get full text
    Get full text
    Other
  12. 12

    Green building factor in machine learning based condominium price prediction by Masrom, S., Mohd, T., Rahman, A.S.A.

    Published 2022
    “…Acknowledging the benefits of green building, Green Certificate and Green Building Index (GBI) has been used as one of the factors in housing prices valuation. …”
    Get full text
    Get full text
    Article
  13. 13
  14. 14
  15. 15

    Implementation And Performance Analysis Of Machine Learning Models For Detecting Phishing Attacks On Websites by Liong, Kah Pong

    Published 2023
    “…Then, a machine learning tool is selected to build machine learning models that use three different machine learning algorithms, which are Support Vector Machine, Random Forest, and XGBoost. …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  16. 16
  17. 17

    An investigation into influence factor of student programming grade using association rule mining by Mohamad Mohsin, Mohamad Farhan, Abd Wahab, Mohd Helmy, Zaiyadi, Mohd Fairuz, Hibadullah, Cik Fazilah

    Published 2010
    “…The dataset consisting of 4 19 records with 70 attributes were pre-processed and then mined using directed association rule mining algorithm namely Apriori. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18
  19. 19

    Flexible content authorization using digital rights management in cloud computing / Ali Hussain by Ali , Hussain

    Published 2021
    “…The integrity of data is verified with the use of HMAC algorithm chain using the verify function of versifier in Macaroon. …”
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20