Search Results - (( things application testing algorithm ) OR ( basic visualization mining algorithm ))

Refine Results
  1. 1
  2. 2

    Using text mining algorithm to detect gender deception based on Malaysian chat room lingo / Dianne L. M. Cheong and Nur Atiqah Sia Abdullah @ Sia Sze Yieng by Cheong, Dianne L.M., Sia Abdullah, Nur Atiqah

    Published 2006
    “…Based on this algorithm. a prototype in Visual Basic is developed It was tested with /6 documents; each consists of 5 e-mails exchanges of respective individuals. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Enhancing predictive crime mapping model using association rule mining for geographical and demographic structure by Asmai, S. A.

    Published 2014
    “…This project proposed a data mining technique called Association Rule Mining. Basically Association Rule Mining is to investigate the rules according to the predefined parameter. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9

    Rtl Implementation Of Secure Hash Algorithm 3 (Sha-3) Towards Smaller Area by Lim , Yen Ruen

    Published 2017
    “…Among all of the cryptography measures, Secure Hash Algorithm 3 (SHA-3) is the newest and secure cryptographic hash algorithm in the current electronic industry. …”
    Get full text
    Get full text
    Thesis
  10. 10

    LoRaWAN-based hybrid internet of wearable things system implementation for smart healthcare by Abdulmalek, Suliman, Abdul Nasir, Abd Ghafar, Jabbar, Waheb A.

    Published 2024
    “…This study introduces the design and development of an Internet of Wearable Things-based Hybrid Healthcare Monitoring System (IoWT-HHMS) for smart medical applications. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    ECG encryption enhancement with multi-layers of AES and DNA computing by Kh-Madhloom, Jamal

    Published 2023
    “…Devices that use the internet of things for DNA sequence testing also require a high level of expertise in the application of public-key cryptography. …”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13
  14. 14
  15. 15
  16. 16
  17. 17

    Internet of wearable things-based on lora and wi-fi healthcare monitoring system for medical applications by Suliman Abdulmalek, Hamood Ahmed

    Published 2024
    “…The system underwent thorough testing, showing stable and accurate readings for vital parameters. …”
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19
  20. 20

    A Decentralized Multi-Factor User Authentication Scheme For The Internet Of Things System by Chiadighikaobi, Ikenna Rene

    Published 2024
    “…Besides, the Mann-Whitney U test statistically shows a significant difference in security and computation cost between the two algorithms. …”
    Get full text
    Get full text
    Get full text
    Thesis