Search Results - (( using certification a algorithm ) OR ( java application optimisation algorithm ))
Search alternatives:
- application optimisation »
- optimisation algorithm »
- using certification »
- java application »
- certification a »
- a algorithm »
-
1
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…The system is essentially a three-part development, utilising Android, Java Servlets, and Arduino platforms to create an optimised and automated urban-gardening system. …”
Get full text
Get full text
Get full text
Article -
2
Web-based expert system for material selection of natural fiber- reinforced polymer composites
Published 2015“…Finally, the developed expert system was deployed over the internet with central interactive interface from the server as a web-based application. As Java is platform independent and easy to be deployed in web based application and accessible through the World Wide Web (www), this expert system can be one stop application for materials selection.…”
Get full text
Get full text
Thesis -
3
User-Device Authentication Model With Digital Certificate For Smartphone User
Published 2024thesis::master thesis -
4
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…User who owes an E-Certificate is able to retrieve from a web page and can be printed out. …”
Get full text
Get full text
Thesis -
5
Secure file sharing with public key infrastructure (PKI) enablement / Noor Azlina Ismail @ Hassan
Published 2015“…This system will used RSA and SHA-256 to produce digital signature because both of the algorithm consist more advantages than other algorithm which is suitable to used to protect document in current insecure network. …”
Get full text
Get full text
Thesis -
6
Price prediction model of green building based on machine learning algorithms / Nur Syafiqah Jamil
Published 2021“…Meanwhile, experiments using five common algorithms, Random Forest Regressor Model outperforms four (4) other algorithms in predicting the price of green building condominium, by training and validating the data-set using Split approach. …”
Get full text
Get full text
Thesis -
7
An improved public key cryptography based on the elliptic curve
Published 2002“…A new algorithm to compress and decompress the sparse elements algorithms are introduced to reduce the size of the transited parameters. …”
Get full text
Get full text
Thesis -
8
A framework of enhanced authentication for PDF textual documents using Zigzag-LSB embedding algorithm
Published 2024“…The effectiveness of the algorithm has been established since it uses an image-based approach after conversion between document and images with a numbering pattern that is fragile to deletion, replacement, insertion, combine, and copy attack. …”
Get full text
Get full text
Thesis -
9
Household overspending model amongst B40, M40 and T20 using classification algorithm
Published 2020“…The family economy is a critical indicator of the well-being of a family institution. …”
Get full text
Get full text
Get full text
Article -
10
Green building factor in machine learning based condominium price prediction
Published 2022“…Green building is generally defined as an environmentally friendly building, which rapidly emerged as a national priority in many countries. Acknowledging the benefits of green building, Green Certificate and Green Building Index (GBI) has been used as one of the factors in housing prices valuation. …”
Get full text
Get full text
Article -
11
Rabin-p encryption scheme analysis on MQTT
Published 2023“…However, Rabin-p offers a lower processing algorithm. A conclusion can be made that using Rabin-p in MQTT can help improve the payload security since Rabin-p offers a complex algorithm which is it harder to decrypt the messages when communicating between devices. …”
Get full text
Get full text
Conference or Workshop Item -
12
Classification and visualization on eligibility rate of applicant’s LinkedIn account using Naïve Bayes / Nurul Atirah Ahmad
Published 2023“…Thus, this project aims to classify and generate a list of potential job applicants by analyzing various attributes of their LinkedIn accounts, such as title, location, skills, education, language, certification, and experience. …”
Get full text
Get full text
Thesis -
13
Classification and visualization on eligibility rate of applicant’s LinkedIn account using Naïve Bayes / Nurul Atirah Ahmad, Khyrina Airin Fariza Abu Samah and Nuwairah Aimi Ahmad...
Published 2023“…Thus, this project aims to classify and generate a list of potential job applicants by analyzing various attributes of their LinkedIn accounts, such as title, location, skills, education, language, certification, and years of experience. …”
Get full text
Get full text
Book Section -
14
Exploring classification for sentiment analysis from halal based tweets
Published 2021“…It uses an algorithmic technique to capture people's thoughts, sentiments, and emotions by incorporating Natural Language Processing and Machine Learning technology. …”
Get full text
Get full text
Other -
15
-
16
Protection of the digital holy Quran using SAB hash function
Published 2013Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
17
Application Of The Blockchain Technology Within Healthcare
Published 2021“…In this project, a Logistic Regression statistical model is developed by using Python to construct the proposed model. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
18
Speech dereverberation enhancement
Published 2020Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
19
Employing Public Key Infrastructure to Encapsulate Messages During Transport Layer Security Handshake Procedure
Published 2022“…Cryptographic protocols Secure Socket Layer (SSL) and Transport Layer Security (TLS) enable data encryption and authentication between various homogeneous and heterogeneous devices such as servers, computers, and software applications running all over a network. These protocols have been successfully used to protect World Wide Web communication between a client and a server that has been encoded using the HTTP protocol for many years. …”
Get full text
Get full text
Get full text
Proceeding -
20
Ethereum blockchain-based three factor authentication and multi-contract access control for secure smart home environment in 5G networks
Published 2025“…The registration contract is performed by a certificate authority, and the key is generated using the Enhanced Elliptic Curve Digital Signature (EECDS) algorithm which improves the secure and private communication between the users, IoT devices, and edge-gateway. …”
Article
