Search Results - (( using certification based algorithm ) OR ( java application reoptimize algorithm ))

  • Showing 1 - 17 results of 17
Refine Results
  1. 1

    Price prediction model of green building based on machine learning algorithms / Nur Syafiqah Jamil by Jamil, Nur Syafiqah

    Published 2021
    “…Meanwhile, experiments using five common algorithms, Random Forest Regressor Model outperforms four (4) other algorithms in predicting the price of green building condominium, by training and validating the data-set using Split approach. …”
    Get full text
    Get full text
    Thesis
  2. 2

    An improved public key cryptography based on the elliptic curve by Al-Daoud, Essam Faleh

    Published 2002
    “…Moreover, the new formula can be used more efficiently when it is combined with the suggested sparse elements algorithms. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Exploring classification for sentiment analysis from halal based tweets by Setik, Roziyani, Raja Lope Ahmad, Raja Mohd Tariqi, Marjudi, Suziyanti

    Published 2021
    “…The classification was performed based on Malaysia halal certification scheme for each tweet to acquire the class label's frequency value based on the sentiment analysis process's polarity results. …”
    Get full text
    Get full text
    Other
  5. 5

    A framework of enhanced authentication for PDF textual documents using Zigzag-LSB embedding algorithm by Nur Alya Afikah, Usop

    Published 2024
    “…The effectiveness of the algorithm has been established since it uses an image-based approach after conversion between document and images with a numbering pattern that is fragile to deletion, replacement, insertion, combine, and copy attack. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Household overspending model amongst B40, M40 and T20 using classification algorithm by Zulaiha Ali, Othman, Azuraliza, Abu Bakar, Nor Samsiah, Sani, Jamaludin, Sallim

    Published 2020
    “…The results show that the decision tree through J48 algorithm has produced the easiest rule to be interpreted. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Application Of The Blockchain Technology Within Healthcare by Lin, Michelle Hwei Yee

    Published 2021
    “…The predictive model is used to forecast the severity level of a person who is infected with COVID-19 virus based on his various symptoms. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  8. 8

    Classification and visualization on eligibility rate of applicant’s LinkedIn account using Naïve Bayes / Nurul Atirah Ahmad by Ahmad, Nurul Atirah

    Published 2023
    “…The system’s functionality based on the use case and usability tested by the Human Resources expert has been tested to evaluate its system requirements. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Classification and visualization on eligibility rate of applicant’s LinkedIn account using Naïve Bayes / Nurul Atirah Ahmad, Khyrina Airin Fariza Abu Samah and Nuwairah Aimi Ahmad... by Ahmad, Nurul Atirah, Abu Samah, Khyrina Airin Fariza, Ahmad Kushairi, Nuwairah Aimi

    Published 2023
    “…The system’s functionality based on the use case and usability tested by the Human Resources expert has been tested to evaluate its system requirements. …”
    Get full text
    Get full text
    Book Section
  10. 10

    Ethereum blockchain-based three factor authentication and multi-contract access control for secure smart home environment in 5G networks by Atiewi S., Al-Rahayfeh A., Almiani M., Abuhussein A., Yussof S.

    Published 2025
    “…The Adaptive Neuro-Fuzzy Inference System (ANFIS) is used for role-based access control and judge contracts. …”
    Article
  11. 11

    Reliable access control for mobile cloud computing (MCC) with cache-aware scheduling by Jamal, Fara, Abdullah, Mohd Taufik, Mohd Hanapi, Zurina, Abdullah, Azizol

    Published 2019
    “…Furthermore, the cache-based scheduling algorithm was upgraded to improve the response time of user jobs. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12
  13. 13

    An investigation into influence factor of student programming grade using association rule mining by Mohamad Mohsin, Mohamad Farhan, Abd Wahab, Mohd Helmy, Zaiyadi, Mohd Fairuz, Hibadullah, Cik Fazilah

    Published 2010
    “…The dataset consisting of 4 19 records with 70 attributes were pre-processed and then mined using directed association rule mining algorithm namely Apriori. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14
  15. 15

    Implementation And Performance Analysis Of Machine Learning Models For Detecting Phishing Attacks On Websites by Liong, Kah Pong

    Published 2023
    “…Then, a machine learning tool is selected to build machine learning models that use three different machine learning algorithms, which are Support Vector Machine, Random Forest, and XGBoost. …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  16. 16

    Secure multi-authority attribute-based encryption access control with cache-aware scheduling in mobile cloud computing by Jamal, Fara

    Published 2021
    “…Fine-grained access control using Attribute-Based Encryption (ABE) mechanisms can be enforced as the first line of defense on the untrusted cloud to forbid unauthorized access to the stored data. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Developing students' mathematical thinking: how far have we came? by Md. Yunus, Aida Suraya

    Published 2015
    “…Thus can the large number of students getting As in mathematics for Lower Secondary School Evaluation (PMR) and Malaysian School Certificate (SPM) be used as indicators of the success in developing students' thinking? …”
    Get full text
    Get full text
    Get full text
    Inaugural Lecture