Search Results - (( using certification based algorithm ) OR ( java application reoptimize algorithm ))
Search alternatives:
- application reoptimize »
- using certification »
- certification based »
- java application »
-
1
Price prediction model of green building based on machine learning algorithms / Nur Syafiqah Jamil
Published 2021“…Meanwhile, experiments using five common algorithms, Random Forest Regressor Model outperforms four (4) other algorithms in predicting the price of green building condominium, by training and validating the data-set using Split approach. …”
Get full text
Get full text
Thesis -
2
An improved public key cryptography based on the elliptic curve
Published 2002“…Moreover, the new formula can be used more efficiently when it is combined with the suggested sparse elements algorithms. …”
Get full text
Get full text
Thesis -
3
-
4
Exploring classification for sentiment analysis from halal based tweets
Published 2021“…The classification was performed based on Malaysia halal certification scheme for each tweet to acquire the class label's frequency value based on the sentiment analysis process's polarity results. …”
Get full text
Get full text
Other -
5
A framework of enhanced authentication for PDF textual documents using Zigzag-LSB embedding algorithm
Published 2024“…The effectiveness of the algorithm has been established since it uses an image-based approach after conversion between document and images with a numbering pattern that is fragile to deletion, replacement, insertion, combine, and copy attack. …”
Get full text
Get full text
Thesis -
6
Household overspending model amongst B40, M40 and T20 using classification algorithm
Published 2020“…The results show that the decision tree through J48 algorithm has produced the easiest rule to be interpreted. …”
Get full text
Get full text
Get full text
Article -
7
Application Of The Blockchain Technology Within Healthcare
Published 2021“…The predictive model is used to forecast the severity level of a person who is infected with COVID-19 virus based on his various symptoms. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
8
Classification and visualization on eligibility rate of applicant’s LinkedIn account using Naïve Bayes / Nurul Atirah Ahmad
Published 2023“…The system’s functionality based on the use case and usability tested by the Human Resources expert has been tested to evaluate its system requirements. …”
Get full text
Get full text
Thesis -
9
Classification and visualization on eligibility rate of applicant’s LinkedIn account using Naïve Bayes / Nurul Atirah Ahmad, Khyrina Airin Fariza Abu Samah and Nuwairah Aimi Ahmad...
Published 2023“…The system’s functionality based on the use case and usability tested by the Human Resources expert has been tested to evaluate its system requirements. …”
Get full text
Get full text
Book Section -
10
Ethereum blockchain-based three factor authentication and multi-contract access control for secure smart home environment in 5G networks
Published 2025“…The Adaptive Neuro-Fuzzy Inference System (ANFIS) is used for role-based access control and judge contracts. …”
Article -
11
Reliable access control for mobile cloud computing (MCC) with cache-aware scheduling
Published 2019“…Furthermore, the cache-based scheduling algorithm was upgraded to improve the response time of user jobs. …”
Get full text
Get full text
Get full text
Article -
12
-
13
An investigation into influence factor of student programming grade using association rule mining
Published 2010“…The dataset consisting of 4 19 records with 70 attributes were pre-processed and then mined using directed association rule mining algorithm namely Apriori. …”
Get full text
Get full text
Get full text
Article -
14
Traffic congestion detection for smart and control transportation management
Published 2020Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
15
Implementation And Performance Analysis Of Machine Learning Models For Detecting Phishing Attacks On Websites
Published 2023“…Then, a machine learning tool is selected to build machine learning models that use three different machine learning algorithms, which are Support Vector Machine, Random Forest, and XGBoost. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
16
Secure multi-authority attribute-based encryption access control with cache-aware scheduling in mobile cloud computing
Published 2021“…Fine-grained access control using Attribute-Based Encryption (ABE) mechanisms can be enforced as the first line of defense on the untrusted cloud to forbid unauthorized access to the stored data. …”
Get full text
Get full text
Thesis -
17
Developing students' mathematical thinking: how far have we came?
Published 2015“…Thus can the large number of students getting As in mathematics for Lower Secondary School Evaluation (PMR) and Malaysian School Certificate (SPM) be used as indicators of the success in developing students' thinking? …”
Get full text
Get full text
Get full text
Inaugural Lecture
