Search Results - (( using certification process algorithm ) OR ( java _ normalization algorithm ))
Search alternatives:
- normalization algorithm »
- using certification »
- process algorithm »
-
1
User-Device Authentication Model With Digital Certificate For Smartphone User
Published 2024thesis::master thesis -
2
Improving resource management with multi-instance broker scheduling algorithm in hierarchical grid computing
Published 2016“…The designed modules is in the form of algorithms, GridSim, Java Development Kits and Java Language used to support the design process whereas the Netbeans software serves as the platform to simulate the experiment so as to obtain the results. …”
Get full text
Get full text
Get full text
Thesis -
3
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
Get full text
Get full text
Conference or Workshop Item -
4
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…On the Construction phase, the development of the prototype has been started. All the algorithm for the engine has been developed by using Java script language. …”
Get full text
Get full text
Thesis -
5
Parallel distributed genetic algorithm development based on microcontrollers framework
Published 2023Conference paper -
6
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Electing the best set of features will help to improve the classifier predictions in terms of the normal and abnormal pattern. The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. …”
Get full text
Get full text
Thesis -
7
A framework of enhanced authentication for PDF textual documents using Zigzag-LSB embedding algorithm
Published 2024“…By dispersing the numbered original data as far away from the original locations as feasible, the strategies made use of specific numbering systems. Similar processes are used in the generation and embedding phases of a watermark. …”
Get full text
Get full text
Thesis -
8
Classification and visualization on eligibility rate of applicant’s LinkedIn account using Naïve Bayes / Nurul Atirah Ahmad
Published 2023“…Thus, this project aims to classify and generate a list of potential job applicants by analyzing various attributes of their LinkedIn accounts, such as title, location, skills, education, language, certification, and experience. This project implements the Naive Bayes algorithm as the classification algorithm. …”
Get full text
Get full text
Thesis -
9
Classification and visualization on eligibility rate of applicant’s LinkedIn account using Naïve Bayes / Nurul Atirah Ahmad, Khyrina Airin Fariza Abu Samah and Nuwairah Aimi Ahmad...
Published 2023“…The recruitment process is vital for organizations. In the digital era, social media platforms like LinkedIn have become famous for recruitment, and recruiters widely use them to find potential employees. …”
Get full text
Get full text
Book Section -
10
Exploring classification for sentiment analysis from halal based tweets
Published 2021“…It usually assigns a polarity of “positive”, “negative” or “neutral”. It uses an algorithmic technique to capture people's thoughts, sentiments, and emotions by incorporating Natural Language Processing and Machine Learning technology. …”
Get full text
Get full text
Other -
11
-
12
Rabin-p encryption scheme analysis on MQTT
Published 2023“…However, Rabin-p offers a lower processing algorithm. A conclusion can be made that using Rabin-p in MQTT can help improve the payload security since Rabin-p offers a complex algorithm which is it harder to decrypt the messages when communicating between devices. …”
Get full text
Get full text
Conference or Workshop Item -
13
A multi-filter feature selection in detecting distributed denial-of-service attack
Published 2019“…In addition, the proposed M2FS method is developed through WEKA API with Java Programming language using the IDE of Eclipse Java. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
14
Speech dereverberation enhancement
Published 2020Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
15
Challenges of hidden data in the unused area two within executable files
Published 2009“…Results: The programs were coded in Java computer language and implemented on Pentium PC. …”
Get full text
Get full text
Get full text
Article -
16
Reliable access control for mobile cloud computing (MCC) with cache-aware scheduling
Published 2019“…However, most of the ABE used single certification authority (CA) and disjoint attribute authority (AA) to verify user identity which can be a single point of failure. …”
Get full text
Get full text
Get full text
Article -
17
Employing Public Key Infrastructure to Encapsulate Messages During Transport Layer Security Handshake Procedure
Published 2022“…These protocols have been successfully used to protect World Wide Web communication between a client and a server that has been encoded using the HTTP protocol for many years. …”
Get full text
Get full text
Get full text
Proceeding -
18
An investigation into influence factor of student programming grade using association rule mining
Published 2010“…The dataset consisting of 4 19 records with 70 attributes were pre-processed and then mined using directed association rule mining algorithm namely Apriori. …”
Get full text
Get full text
Get full text
Article -
19
Traffic congestion detection for smart and control transportation management
Published 2020Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
20
Anfis Modelling On Diabetic Ketoacidosis For Unrestricted Food Intake Conditions
Published 2017“…The project has also implemented the optimization process onto the proposed ANFIS model through the hybrid of Genetic Algorithm on the fuzzy membership function of the ANFIS model. …”
Get full text
Get full text
Get full text
Get full text
Thesis
