Search Results - (( process certification from algorithm ) OR ( java application path algorithm ))
Search alternatives:
- process certification »
- certification from »
- java application »
- application path »
- from algorithm »
- path algorithm »
-
1
Smart appointment organizer for mobile application / Mohd Syafiq Adam
Published 2009“…In creating this application, NetBeans IDE 6.5and Java Micro Edition (Java ME) are used. …”
Get full text
Get full text
Thesis -
2
Visdom: Smart guide robot for visually impaired people
Published 2025“…The system architecture integrates ROS 2 on a Raspberry Pi, with TCP/IP connectivity enabling remote operation. An Android mobile application, developed using Java and the java.net.Socket library, provides an intuitive and accessible user interface for seamless interaction with the robot. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
3
Visdom: Smart guide robot for visually impaired people
Published 2025“…The system architecture integrates ROS 2 on a Raspberry Pi, with TCP/IP connectivity enabling remote operation. An Android mobile application, developed using Java and the java.net.Socket library, provides an intuitive and accessible user interface for seamless interaction with the robot. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
4
User-Device Authentication Model With Digital Certificate For Smartphone User
Published 2024thesis::master thesis -
5
A framework of enhanced authentication for PDF textual documents using Zigzag-LSB embedding algorithm
Published 2024“…The security level for documents is necessary since a lot of formal procedures and processes nowadays need digital documents as proof or process verification, such as internet banking receipts, official letters of appointment, academic transcripts and certificates, scanned documents, and commercial documents for online marketing. …”
Get full text
Get full text
Thesis -
6
Exploring classification for sentiment analysis from halal based tweets
Published 2021“…The classification was performed based on Malaysia halal certification scheme for each tweet to acquire the class label's frequency value based on the sentiment analysis process's polarity results. …”
Get full text
Get full text
Other -
7
Classification and visualization on eligibility rate of applicant’s LinkedIn account using Naïve Bayes / Nurul Atirah Ahmad
Published 2023“…The recruitment process is crucial in organizations, as it involves selecting qualified applicants from a diverse pool. …”
Get full text
Get full text
Thesis -
8
-
9
Impact of Computational Thinking and Computer Science (CTCS) Teaching Technique at Seleceted Schools in Sarawak : A Qualitative Analysis
Published 2023“…Computational thinking and computer science (CTCS) is an educational approach that involves a four-stage process involving concepts of decomposition, pattern recognition, abstraction, and algorithm that promotes greater levels of thinking. …”
Get full text
Get full text
Get full text
Proceeding -
10
Speech dereverberation enhancement
Published 2020Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
11
An investigation into influence factor of student programming grade using association rule mining
Published 2010“…The dataset consisting of 4 19 records with 70 attributes were pre-processed and then mined using directed association rule mining algorithm namely Apriori. …”
Get full text
Get full text
Get full text
Article -
12
Traffic congestion detection for smart and control transportation management
Published 2020Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
13
Developing students' mathematical thinking: how far have we came?
Published 2015“…Several findings from studies that focused on students' ability to provide reasoning and give meanings to concepts and algorithms are highlighted. …”
Get full text
Get full text
Get full text
Inaugural Lecture -
14
Secure multi-authority attribute-based encryption access control with cache-aware scheduling in mobile cloud computing
Published 2021“…A user’s secret key to acquire data from the cloud will not be generated if there is a failure in one of the Attribute Authority’s nodes. …”
Get full text
Get full text
Thesis
