Search Results - (( using certification model algorithm ) OR ( java application customization algorithm ))
Search alternatives:
- customization algorithm »
- using certification »
- certification model »
- java application »
- model algorithm »
-
1
User-Device Authentication Model With Digital Certificate For Smartphone User
Published 2024thesis::master thesis -
2
Price prediction model of green building based on machine learning algorithms / Nur Syafiqah Jamil
Published 2021“…As the most important features towards transaction price, building security made the largest contribution to the Multiple Linear Regression Model. Meanwhile, experiments using five common algorithms, Random Forest Regressor Model outperforms four (4) other algorithms in predicting the price of green building condominium, by training and validating the data-set using Split approach. …”
Get full text
Get full text
Thesis -
3
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
Get full text
Get full text
Thesis -
4
Household overspending model amongst B40, M40 and T20 using classification algorithm
Published 2020“…Availability of 4 million household expenditure records obtained from the survey conducted in 2016 by the Department of Statistics Malaysia eases the aim of this study to develop a household overspending model by using machine learning. The model is developed using 12 household demographic attributes with 14451 household records. …”
Get full text
Get full text
Get full text
Article -
5
Green building factor in machine learning based condominium price prediction
Published 2022“…The results indicated that RF has been outperformed others while Green Certificate and GBI have only been slightly important in the DL model. …”
Get full text
Get full text
Article -
6
Classification and visualization on eligibility rate of applicant’s LinkedIn account using Naïve Bayes / Nurul Atirah Ahmad
Published 2023“…Thus, this project aims to classify and generate a list of potential job applicants by analyzing various attributes of their LinkedIn accounts, such as title, location, skills, education, language, certification, and experience. This project implements the Naive Bayes algorithm as the classification algorithm. …”
Get full text
Get full text
Thesis -
7
Application Of The Blockchain Technology Within Healthcare
Published 2021“…In this project, a Logistic Regression statistical model is developed by using Python to construct the proposed model. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
8
Implementation And Performance Analysis Of Machine Learning Models For Detecting Phishing Attacks On Websites
Published 2023“…Then, a machine learning tool is selected to build machine learning models that use three different machine learning algorithms, which are Support Vector Machine, Random Forest, and XGBoost. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
9
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
10
Classification and visualization on eligibility rate of applicant’s LinkedIn account using Naïve Bayes / Nurul Atirah Ahmad, Khyrina Airin Fariza Abu Samah and Nuwairah Aimi Ahmad...
Published 2023“…Thus, this project aims to classify and generate a list of potential job applicants by analyzing various attributes of their LinkedIn accounts, such as title, location, skills, education, language, certification, and years of experience. This project implements the Naive Bayes algorithm as the classification algorithm. …”
Get full text
Get full text
Book Section -
11
Flexible content authorization using digital rights management in cloud computing / Ali Hussain
Published 2021“…The integrity of data is verified with the use of HMAC algorithm chain using the verify function of versifier in Macaroon. …”
Get full text
Get full text
Get full text
Thesis
