Search Results - (( process certification a algorithm ) OR ( java application reoptimize algorithm ))
Search alternatives:
- application reoptimize »
- process certification »
- java application »
- certification a »
- a algorithm »
-
1
User-Device Authentication Model With Digital Certificate For Smartphone User
Published 2024thesis::master thesis -
2
A framework of enhanced authentication for PDF textual documents using Zigzag-LSB embedding algorithm
Published 2024“…The security level for documents is necessary since a lot of formal procedures and processes nowadays need digital documents as proof or process verification, such as internet banking receipts, official letters of appointment, academic transcripts and certificates, scanned documents, and commercial documents for online marketing. …”
Get full text
Get full text
Thesis -
3
Exploring classification for sentiment analysis from halal based tweets
Published 2021“…It uses an algorithmic technique to capture people's thoughts, sentiments, and emotions by incorporating Natural Language Processing and Machine Learning technology. …”
Get full text
Get full text
Other -
4
Classification and visualization on eligibility rate of applicant’s LinkedIn account using Naïve Bayes / Nurul Atirah Ahmad
Published 2023“…The recruitment process is crucial in organizations, as it involves selecting qualified applicants from a diverse pool. …”
Get full text
Get full text
Thesis -
5
Classification and visualization on eligibility rate of applicant’s LinkedIn account using Naïve Bayes / Nurul Atirah Ahmad, Khyrina Airin Fariza Abu Samah and Nuwairah Aimi Ahmad...
Published 2023“…Thus, this project aims to classify and generate a list of potential job applicants by analyzing various attributes of their LinkedIn accounts, such as title, location, skills, education, language, certification, and years of experience. …”
Get full text
Get full text
Book Section -
6
-
7
Rabin-p encryption scheme analysis on MQTT
Published 2023“…However, Rabin-p offers a lower processing algorithm. A conclusion can be made that using Rabin-p in MQTT can help improve the payload security since Rabin-p offers a complex algorithm which is it harder to decrypt the messages when communicating between devices. …”
Get full text
Get full text
Conference or Workshop Item -
8
Impact of Computational Thinking and Computer Science (CTCS) Teaching Technique at Seleceted Schools in Sarawak : A Qualitative Analysis
Published 2023“…Computational thinking and computer science (CTCS) is an educational approach that involves a four-stage process involving concepts of decomposition, pattern recognition, abstraction, and algorithm that promotes greater levels of thinking. …”
Get full text
Get full text
Get full text
Proceeding -
9
Speech dereverberation enhancement
Published 2020Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
10
Reliable access control for mobile cloud computing (MCC) with cache-aware scheduling
Published 2019“…However, most of the ABE used single certification authority (CA) and disjoint attribute authority (AA) to verify user identity which can be a single point of failure. …”
Get full text
Get full text
Get full text
Article -
11
Employing Public Key Infrastructure to Encapsulate Messages During Transport Layer Security Handshake Procedure
Published 2022“…Among the reported attacks on TSL is the Drown attack which is a prevalent type of attack. In order to prevent such types of attacks, a Public Key Infrastructure (PKI) method is proposed in this study for encapsulating messages between the client and the server while doing the TLS handshake process. …”
Get full text
Get full text
Get full text
Proceeding -
12
Traffic congestion detection for smart and control transportation management
Published 2020Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
13
An investigation into influence factor of student programming grade using association rule mining
Published 2010“…The dataset consisting of 4 19 records with 70 attributes were pre-processed and then mined using directed association rule mining algorithm namely Apriori. …”
Get full text
Get full text
Get full text
Article -
14
Developing students' mathematical thinking: how far have we came?
Published 2015“…This paper discusses what is meant by mathematical thinking. There has not been a conclusive definition on mathematical thinking because some view it as a process and others as an outcome. …”
Get full text
Get full text
Get full text
Inaugural Lecture -
15
Secure multi-authority attribute-based encryption access control with cache-aware scheduling in mobile cloud computing
Published 2021“…In particular, the Certificate Authority is a single entity that leads to a single point of failure, while the Attribute Authority works independently. …”
Get full text
Get full text
Thesis
