Search Results - (( using certification from algorithm ) OR ( java wave optimization algorithm ))
Search alternatives:
- using certification »
- certification from »
- wave optimization »
- from algorithm »
- java »
-
1
User-Device Authentication Model With Digital Certificate For Smartphone User
Published 2024thesis::master thesis -
2
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…User who owes an E-Certificate is able to retrieve from a web page and can be printed out. …”
Get full text
Get full text
Thesis -
3
Secure file sharing with public key infrastructure (PKI) enablement / Noor Azlina Ismail @ Hassan
Published 2015“…As for digital storage, USB token with authentication mechanism can be used to protect the digital certificate from being stolen by other people as future recommendation.…”
Get full text
Get full text
Thesis -
4
Price prediction model of green building based on machine learning algorithms / Nur Syafiqah Jamil
Published 2021“…Meanwhile, experiments using five common algorithms, Random Forest Regressor Model outperforms four (4) other algorithms in predicting the price of green building condominium, by training and validating the data-set using Split approach. …”
Get full text
Get full text
Thesis -
5
The Effect of Entry Qualifications and Gender Towards Student Performance
Published 2009“…Entries qualifications are from Foundation Program, Higher Certificate of Malaysian Education (STPM) and Diploma Certificate. …”
Get full text
Get full text
Conference or Workshop Item -
6
A framework of enhanced authentication for PDF textual documents using Zigzag-LSB embedding algorithm
Published 2024“…By dispersing the numbered original data as far away from the original locations as feasible, the strategies made use of specific numbering systems. …”
Get full text
Get full text
Thesis -
7
Household overspending model amongst B40, M40 and T20 using classification algorithm
Published 2020“…Availability of 4 million household expenditure records obtained from the survey conducted in 2016 by the Department of Statistics Malaysia eases the aim of this study to develop a household overspending model by using machine learning. …”
Get full text
Get full text
Get full text
Article -
8
Classification and visualization on eligibility rate of applicant’s LinkedIn account using Naïve Bayes / Nurul Atirah Ahmad
Published 2023“…Thus, this project aims to classify and generate a list of potential job applicants by analyzing various attributes of their LinkedIn accounts, such as title, location, skills, education, language, certification, and experience. This project implements the Naive Bayes algorithm as the classification algorithm. …”
Get full text
Get full text
Thesis -
9
Exploring classification for sentiment analysis from halal based tweets
Published 2021“…It usually assigns a polarity of “positive”, “negative” or “neutral”. It uses an algorithmic technique to capture people's thoughts, sentiments, and emotions by incorporating Natural Language Processing and Machine Learning technology. …”
Get full text
Get full text
Other -
10
Green building factor in machine learning based condominium price prediction
Published 2022“…Acknowledging the benefits of green building, Green Certificate and Green Building Index (GBI) has been used as one of the factors in housing prices valuation. …”
Get full text
Get full text
Article -
11
Protection of the digital holy Quran using SAB hash function
Published 2013Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
12
-
13
Implementation And Performance Analysis Of Machine Learning Models For Detecting Phishing Attacks On Websites
Published 2023“…Then, a machine learning tool is selected to build machine learning models that use three different machine learning algorithms, which are Support Vector Machine, Random Forest, and XGBoost. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
14
Speech dereverberation enhancement
Published 2020Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
15
An investigation into influence factor of student programming grade using association rule mining
Published 2010“…The dataset consisting of 4 19 records with 70 attributes were pre-processed and then mined using directed association rule mining algorithm namely Apriori. …”
Get full text
Get full text
Get full text
Article -
16
Traffic congestion detection for smart and control transportation management
Published 2020Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
17
Flexible content authorization using digital rights management in cloud computing / Ali Hussain
Published 2021“…The integrity of data is verified with the use of HMAC algorithm chain using the verify function of versifier in Macaroon. …”
Get full text
Get full text
Get full text
Thesis -
18
-
19
Developing students' mathematical thinking: how far have we came?
Published 2015“…Thus can the large number of students getting As in mathematics for Lower Secondary School Evaluation (PMR) and Malaysian School Certificate (SPM) be used as indicators of the success in developing students' thinking? …”
Get full text
Get full text
Get full text
Inaugural Lecture -
20
Secure multi-authority attribute-based encryption access control with cache-aware scheduling in mobile cloud computing
Published 2021“…For the proposed scheme, the MTTD was very low which is 4.89 minutes, because of the consensus algorithm. Furthermore, by using the cache-aware scheduling, the proposed scheme managed to save 2.18% reads more than those of the existing work solution; this could reduce the time taken to access required data. …”
Get full text
Get full text
Thesis
