Search Results - (tokenization OR moderation).

Refine Results
  1. 1

    Migration of hardware Aladdin e-Token to soft-token OpenVPN to increase the quality of service (QoS) / Hasrulnudin Ahmad by Ahmad, Hasrulnudin

    Published 2014
    “…Therefore the study made to identify weaknesses Aladdin e-Token then build Soft-token and assess the ability of the Soft-token approach. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Cohesive token passing algorithm utilizing software agents by Abdulrazzak, A. Fua’ad, Subramaniam, Shamala

    Published 2010
    “…The developed software agent is utilized to implement prioritized token access subject to the traffic type. Each station is coupled with a software agent who cohesively collaborates to assign the token. …”
    Get full text
    Get full text
    Article
  3. 3

    Permission-based fault tolerant mutual exclusion algorithm for mobile Ad Hoc networks by Zarafshan, Faraneh

    Published 2015
    “…Token may lose during communications, because of link failure or failure of token host. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Artificial Intelligence and Sustainable Governance: The Moderating Role of Board Gender and Age Diversity by Yue, Shanshan, Bajuri, Norkhairul Hafiz, Wang, Bin, Samara, Husni

    Published 2026
    “…Board gender diversity positively moderates this relationship, which underscores the strategic value of inclusive leadership. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    UMP launches alumni card as a token of gratitude by Mimi Rabita, Abdul Wahit

    Published 2020
    “…Gambang 19 October 2020 - Universiti Malaysia Pahang (UMP) launched an alumni card for all its alumni by offering various benefits as a token of gratitude.…”
    Get full text
    Get full text
    Get full text
    Newspaper
  6. 6

    Antecedents and outcomes of destination image of Malaysia by Kani, Yusuf, Abdul Aziz, Yuhanis, Sambasivan, Murali, Bojei, Jamil

    Published 2017
    “…This paper also investigates the moderating role of perceived risk between destination image and revisit intention. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    NUWT: Jawi-Specific Buckwalter Corpus for Malay Word Tokenization by Abu Bakar, Juhaida, Omar, Khairuddin, Nasrudin, Mohammad Faidzul, Murah, Mohd Zamri

    Published 2016
    “…One of the important roles and fundamental tasks of the corpus, which is the tokenization, is also presented in this paper. The development of the Malay language tokenizer is based on the syntactic data compatibility of Malay words written in Jawi. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Virtual exhibition: a non fungible token (NFT) / Perpustakaan Tengku Anis by UiTM Kelantan, Perpustakaan Tengku Anis

    Published 2022
    “…"Tokenizing" these real world tangible assets makes trading, selling and buying more efficient while reduce the fraud.…”
    Get full text
    Get full text
    Get full text
    Monograph
  9. 9

    NUWT: Jawi-specific Buckwalter corpus for Malays word tokenization by Abu Bakar, Juhaida, Omar, Khairuddin, Nasrudin, Mohammad Faidzul, Murah, Mohd Zamri

    Published 2016
    “…The gathering and processing steps, as well as the definition of several evaluation tasks regarding the use of these corpora, are included in this paper.One of the important roles and fundamental tasks of the corpus, which is the tokenization, is also presented in this paper.The development of the Malay language tokenizer is based on the syntactic data compatibility of Malay words written in Jawi.A series of experiments were performed to validate the corpus and to fulfill the requirement of the Jawi script tokenizer with an average error rate of 0.020255.Based on this promising result, the token will be used for the disambiguation and unknown word resolution, such as out-of vocabulary (OOV) problem in the tagging process.…”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Wireless controller area networking using token frame scheme by Ng, Wei Lun

    Published 2012
    “…The proposed WCAN uses token frame method in providing channel access to nodes in the system. …”
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12

    Electronic token system using RF technology by Thamayanthi, Thangavelu

    Published 2008
    “…It takes designing and building the electronic token and interface with the personal computer (PC) through USB. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  13. 13

    Enhancement Of Traffic Collision Avoidance Using Token Bucket Algorithm by Mat Nawi, Nor Afifah

    Published 2016
    “…In this project, the optimal size of bucket in Token Bucket Algorithm is used as one of the techniques in traffic shaping. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15

    Rangkaian gelang dengan laluan token by Mohd Saman, Md. Yazid

    “…Rangkaian Gelang yang menggunakan kaedah Laluan-Token sebagai protokol penvelarasan penggunaan salurannva adalah merupakan satu rangkaian yang dipopularkan oleh IBM(tm). …”
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    Non-fungible tokens, blockchain carbon credits, and the transition to carbon neutrality in supply chains by Luqman Hakim, Abdul Majid, Fernando, Yudi, Lim, Ming K., Tseng, Ming-Lang

    Published 2025
    “…Our results show that non-fungible tokens enhance carbon transparency by providing traceable, verifiable carbon data. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Performance evaluation of wireless controller area network (WCAN) using token frame scheme by Ng, Wei Lun, Ng, Chee Kyun, Mohd Ali, Borhanuddin, Noordin, Nor Kamariah

    Published 2013
    “…This token frame method follows the example used in wireless token ring protocol which is a wireless network protocol that reduces the number of retransmissions as a result of collisions. …”
    Get full text
    Get full text
    Article
  18. 18

    QoS improvement for multimedia traffic in WLANs with TTN approach by Seeme, Fatima Bilkis, Arafat, Abdullah Omar, Dimyati, Kaharudin

    Published 2010
    “…This study proposes a Time Division Multiple Access (TDMA) based token passing MAC (Media Access Control) protocol, TTN (TDMA based Token Network). …”
    Get full text
    Get full text
    Article
  19. 19

    Effect Of A Token Economy Training Program In Reducing Inattention And Hyperactivity Among Female Students With Learning Disabilities In Saudi Arabia by Al Jawabra, Wafa Fawwaz M

    Published 2017
    “…This study aimed at evaluating the effect of the token economy training program in reducing inattention and hyperactivity among female students with learning disabilities in resource rooms. …”
    Get full text
    Get full text
    Thesis
  20. 20

    The dimensioning of non-token-bucket parameters for efficient and reliable QoS routing decisions in bluetooth ad hoc network by Hasbullah, Halabi, Ismail, M., Jumari, K.

    Published 2008
    “…The development of a traffic-descriptor thus far however, had only considered the Token-Bucket parameters, while the use of non-Token-Bucket parameters, which may contribute significantly to QoS achievement have been omitted. …”
    Get full text
    Get full text
    Conference or Workshop Item