Search Results - (( process certification techniques algorithm ) OR ( java adaptation optimization algorithm ))

  • Showing 1 - 11 results of 11
Refine Results
  1. 1
  2. 2

    A framework of enhanced authentication for PDF textual documents using Zigzag-LSB embedding algorithm by Nur Alya Afikah, Usop

    Published 2024
    “…The security level for documents is necessary since a lot of formal procedures and processes nowadays need digital documents as proof or process verification, such as internet banking receipts, official letters of appointment, academic transcripts and certificates, scanned documents, and commercial documents for online marketing. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Exploring classification for sentiment analysis from halal based tweets by Setik, Roziyani, Raja Lope Ahmad, Raja Mohd Tariqi, Marjudi, Suziyanti

    Published 2021
    “…It usually assigns a polarity of “positive”, “negative” or “neutral”. It uses an algorithmic technique to capture people's thoughts, sentiments, and emotions by incorporating Natural Language Processing and Machine Learning technology. …”
    Get full text
    Get full text
    Other
  4. 4
  5. 5

    Anfis Modelling On Diabetic Ketoacidosis For Unrestricted Food Intake Conditions by Saraswati, Galuh Wilujeng

    Published 2017
    “…The project has also implemented the optimization process onto the proposed ANFIS model through the hybrid of Genetic Algorithm on the fuzzy membership function of the ANFIS model. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7
  8. 8

    Reliable access control for mobile cloud computing (MCC) with cache-aware scheduling by Jamal, Fara, Abdullah, Mohd Taufik, Mohd Hanapi, Zurina, Abdullah, Azizol

    Published 2019
    “…Furthermore, the cache-based scheduling algorithm was upgraded to improve the response time of user jobs. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    An investigation into influence factor of student programming grade using association rule mining by Mohamad Mohsin, Mohamad Farhan, Abd Wahab, Mohd Helmy, Zaiyadi, Mohd Fairuz, Hibadullah, Cik Fazilah

    Published 2010
    “…The dataset consisting of 4 19 records with 70 attributes were pre-processed and then mined using directed association rule mining algorithm namely Apriori. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10
  11. 11

    Secure multi-authority attribute-based encryption access control with cache-aware scheduling in mobile cloud computing by Jamal, Fara

    Published 2021
    “…In particular, the Certificate Authority is a single entity that leads to a single point of failure, while the Attribute Authority works independently. …”
    Get full text
    Get full text
    Thesis