Zobrazeno 1 - 10
of 37
pro vyhledávání: '"Nordin Abu Bakar"'
Autor:
Noraini Seman, Zainab Abu Bakar, Nordin Abu Bakar, Haslizatul Fairuz Mohamed, Nur Atiqah Sia Abdullah, Prasanna Ramakrisnan, Sharifah Mumtazah Syed Ahmad
Publikováno v:
Malaysian Journal of Computing, Vol 1, Pp 74-87 (2010)
This paper describes speech recognizer modeling techniques which are suited to high performance and robust isolated word recognition in speaker-independent manner. In this study, a speech recognition system is presented, specifically for an isolated
Externí odkaz:
https://doaj.org/article/ce66a209fc844f168d099ff90e162897
Publikováno v:
Bulletin of Electrical Engineering and Informatics. 9
This paper presents visual analytics of 3D LiDAR point clouds in robotics operating system. In this study, experiment on Simultaneous Localization and Mapping (SLAM) using point cloud data derived from the Light Detection and Ranging (LiDAR) technolo
Autor:
Marshima Mohd Rosli, Syed Ahmad Aljunid, Normaly Kamal Ismail, Nurazzah Abd Rahman, Shaiful Bakhtiar bin Rodzman, Yun-Huoy Choo, Nordin Abu Bakar
Intelligent systems are created to automate decision making process that is similar to human intelligence. Incorporating intelligent component has achieved promising results in many applications, including in education. Intelligence modules in a tuto
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::f29491e9c5d04e2736a96ae6df37188d
https://zenodo.org/record/5496387
https://zenodo.org/record/5496387
Publikováno v:
Contemporary Management and Science Issues in the Halal Industry ISBN: 9789811326752
Understanding the nature of business around you may help organizations to make a better decision, starting a new business, investing to expand, doing join venture, looking for potential collaborators, and goes on. One of the trending phenomena is to
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::db065c882e7485487715f28f05912c4b
https://doi.org/10.1007/978-981-13-2677-6_2
https://doi.org/10.1007/978-981-13-2677-6_2
The impact of economic cyclicality on financial risks: Evidence of Islamic Microfinance institutions
Publikováno v:
International Journal of Business and Emerging Markets. 13:1
Loan portfolio is the largest asset component and a source of risk that a microfinance institution needs to treat carefully. The quality of the loan portfolio is very crucial as the loans are typically not backed by any physical collateral. Having du
Autor:
Fatin Balkis Alzahri, Noor Latiffah Adam, Shaharuddin Cik Soh, Nordin Abu Bakar, Nor Ashikin Mohamad Kamal
Publikováno v:
Advances in Visual Informatics ISBN: 9783319700090
IVIC
IVIC
Self-regulated learning (SRL) is an academically effective form of learning, which learners must set their goals and make plans before starting to learn. As an ongoing process, learners need to monitor and regulate their cognition, motivation, and be
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::f1d1a68a4cafea11db1447d30849097d
https://doi.org/10.1007/978-3-319-70010-6_14
https://doi.org/10.1007/978-3-319-70010-6_14
Publikováno v:
Computer Fraud & Security. 2014:8-16
An increasing competition among companies specialising in software production and services has emerged over the years. Today, companies compete even on trivial matters, aiming to produce dependable, reliable and affordable software applications. To a
Publikováno v:
Journal of Computer Science. 10:1411-1417
Current applications and systems contain the software components as the basic elements and Component Based Software Development (CBSD) has been successful in building applications and systems. However, the security of CBSD for the software component
Publikováno v:
Journal of Applied Security Research. 9:348-371
Current organizational vulnerabilities mainly originate from Web applications. The security holes in Web applications have resulted in credit card theft, damaged financial resources and reputation of institutions, and compromised computers. Existing
Publikováno v:
Information Technology Journal. 13:2240-2249