Database System Model of Tender Management System in Kadastra
| Main Authors: | Noraziah, Ahmad, S. N., Abdul Samad, Muhammed Ramiza, Ramli, N. M., Noor, Syahrulanuar, Ngah, Mohamad Fadli, Zolkipli |
|---|---|
| Format: | Conference or Workshop Item |
| Language: | English |
| Published: |
2007
|
| Subjects: | |
| Online Access: | http://umpir.ump.edu.my/id/eprint/972/ http://umpir.ump.edu.my/id/eprint/972/1/NaCSES-2007-096_Dbase_of_TMS_in_Kadastra.pdf |
Similar Items
Study of graphical authentication system based on persuasive rotation, resizing and cued click point (GUAS)
by: Zolkipli, Mohamad Fadli
Published: (2014)
by: Zolkipli, Mohamad Fadli
Published: (2014)
Android: S-Based Technique in Mobile Malware Detection
by: Rahiwan Nazar, Romli, et al.
Published: (2018)
by: Rahiwan Nazar, Romli, et al.
Published: (2018)
Intrusion-Detection System Based on Fast Learning Network in Cloud Computing
by: Mohammed Hasan, Ali, et al.
Published: (2018)
by: Mohammed Hasan, Ali, et al.
Published: (2018)
Understanding the root of attack in android malware
by: Rahiwan Nazar, Romli, et al.
Published: (2018)
by: Rahiwan Nazar, Romli, et al.
Published: (2018)
Managing educational resource-student information systems using BVAGQ fragmented database replication model
by: Noraziah, Ahmad, et al.
Published: (2011)
by: Noraziah, Ahmad, et al.
Published: (2011)
Ukur Kadastra - Pengendalian Sistem Dan Penyelesaian Masalah.
by: W.Hussin, Assoc.Prof.Dr.W.Muhd Aminuddin
Published: (1996)
by: W.Hussin, Assoc.Prof.Dr.W.Muhd Aminuddin
Published: (1996)
E-commerce solution for electronic tendering system using secure electronic transaction / Mazlina Abdul Majid
by: Mazlina , Abdul Majid
Published: (2004)
by: Mazlina , Abdul Majid
Published: (2004)
A framework for malware identification based on behavior
by: Mohamad Fadli, Zolkipli
Published: (2012)
by: Mohamad Fadli, Zolkipli
Published: (2012)
Final Year Project Allocation System Techniques: A Systematic Literature Review
by: Nik Intan Syahiddatul Ilani, Jailani, et al.
Published: (2022)
by: Nik Intan Syahiddatul Ilani, Jailani, et al.
Published: (2022)
Review of firewall optimization techniques
by: Shakirah, Saidin, et al.
Published: (2018)
by: Shakirah, Saidin, et al.
Published: (2018)
A New Approach to Secure and Manage Load Balancing of the Distributed Database Using SQL Firewall
by: A., Fairuzullah, et al.
by: A., Fairuzullah, et al.
Response Option for Attacks Detected by Intrusion Detection System
by: Shahid, Anwar, et al.
Published: (2015)
by: Shahid, Anwar, et al.
Published: (2015)
Sigmoid function implementation using the unequal segmentation of differential lookup table and second order nonlinear function
by: Syahrulanuar, Ngah, et al.
Published: (2017)
by: Syahrulanuar, Ngah, et al.
Published: (2017)
Wireless and configurationless iClassroom system with remote database via Bonjour
by: M. A., Ameedeen, et al.
Published: (2012)
by: M. A., Ameedeen, et al.
Published: (2012)
From Intrusion Detection to an Intrusion Response System: Fundamentals, Requirements, and Future Directions
by: Shahid, Anwar, et al.
Published: (2017)
by: Shahid, Anwar, et al.
Published: (2017)
Fragmentation techniques for ideal performance in distributed database - a survey
by: Sharifah Hafizah, Syed Ahmad Ubaidillah, et al.
Published: (2020)
by: Sharifah Hafizah, Syed Ahmad Ubaidillah, et al.
Published: (2020)
Investigation of Security Awareness on e-Learning System Among Lecturers and Students in Higher Education Institution
by: Hasmanizam, Abdul Majid, et al.
Published: (2015)
by: Hasmanizam, Abdul Majid, et al.
Published: (2015)
Data Security Issues In Cloud Computing: Review
by: Ahmed, Hussam Alddin Shihab, et al.
Published: (2016)
by: Ahmed, Hussam Alddin Shihab, et al.
Published: (2016)
An automate failure recovery for synchronous distributed database system
by: Ahmad Shukri, Mohd Noor, et al.
Published: (2022)
by: Ahmad Shukri, Mohd Noor, et al.
Published: (2022)
DFP-growth: An efficient algorithm for mining frequent patterns in dynamic database
by: Zailani, Abdullah, et al.
Published: (2012)
by: Zailani, Abdullah, et al.
Published: (2012)
Managing MyGRANTS Fragmented Database Using Binary Vote Assignment Grid Quorum with Association Rule (BVAGQ-AR) Replication Model
by: Noraziah, Ahmad, et al.
Published: (2015)
by: Noraziah, Ahmad, et al.
Published: (2015)
An efficient multi join query optimization for relational database management system using swarm intelligence approaches
by: Alsaedi, Ahmed Khalaf Zager
Published: (2016)
by: Alsaedi, Ahmed Khalaf Zager
Published: (2016)
Review of the Sigmoid Function Implementation into Digital Hardware
by: Syahrulanuar, Ngah, et al.
Published: (2015)
by: Syahrulanuar, Ngah, et al.
Published: (2015)
Local Position Estimation Using an Artificial Neural Network Based Model with a Hardware Implementation
by: Abdullah, Embong, et al.
Published: (2012)
by: Abdullah, Embong, et al.
Published: (2012)
Indoor positioning using artificial neural network with field programmable gate array implementation
by: Syahrulanuar, Ngah, et al.
Published: (2018)
by: Syahrulanuar, Ngah, et al.
Published: (2018)
Persistence framework for multiple legacy databases of patient information systems / Khor Chin Heong.
by: Khor, Chin Heong
Published: (2000)
by: Khor, Chin Heong
Published: (2000)
Pre-Fetch Data Caching Strategy in Mobile Database System for Integrity Constraints Checking
by: Zarina, Dzolkhifli, et al.
Published: (2015)
by: Zarina, Dzolkhifli, et al.
Published: (2015)
An architectural design for a hybrid intrusion detection system for database
by: Haratian, Mohammad Hossein
Published: (2009)
by: Haratian, Mohammad Hossein
Published: (2009)
A novel binary vote assignment grid quorum algorithm for distributed database fragmentation
by: Ainul Azila, Che Fauzi, et al.
Published: (2011)
by: Ainul Azila, Che Fauzi, et al.
Published: (2011)
Tunggukan Ukur Kadastra Negara - Kajian Statistik Dan Cabaran Juruukur Tanah.
by: W.Hussin, Assoc.Prof.Dr.W.Muhd Aminuddin
Published: (1998)
by: W.Hussin, Assoc.Prof.Dr.W.Muhd Aminuddin
Published: (1998)
EFP-M2: Efficient model for mining frequent patterns in transactional database
by: Herawan, Tutut, et al.
Published: (2012)
by: Herawan, Tutut, et al.
Published: (2012)
Handling fragmented database replication through binary vote assignment grid quorum
by: Ainul Azila, Che Fauzi, et al.
Published: (2011)
by: Ainul Azila, Che Fauzi, et al.
Published: (2011)
Integrated technical problem management system (ITPMS)
by: Mohamad Noor, Norzaliha
Published: (2005)
by: Mohamad Noor, Norzaliha
Published: (2005)
Efficient feature selection analysis for accuracy malware classification
by: Rahiwan Nazar, Romli, et al.
Published: (2021)
by: Rahiwan Nazar, Romli, et al.
Published: (2021)
Performance Comparison of Transmission Control Protocol and User Datagram Protocol over Wireless Networks
by: Mohammed Hasan, Ali, et al.
Published: (2015)
by: Mohammed Hasan, Ali, et al.
Published: (2015)
Design a Technique for Minimizing Unnecessary Handoff
in Mobile Wireless Networks
by: Rahman, Md. Arafatur, et al.
Published: (2015)
by: Rahman, Md. Arafatur, et al.
Published: (2015)
Ransomware: Stages, detection and evasion
by: Yus Kamalrul, Mohamed Yunus, et al.
Published: (2021)
by: Yus Kamalrul, Mohamed Yunus, et al.
Published: (2021)
Auto–transition in RADG based on chaotic system
by: Kadhum, Laith M., et al.
Published: (2023)
by: Kadhum, Laith M., et al.
Published: (2023)
Learning management system through assignment box alert
by: Noraziah, Ahmad, et al.
Published: (2011)
by: Noraziah, Ahmad, et al.
Published: (2011)
Battery Efficiency of Mobile Devices through Computational Offloading: A Review
by: Ali, Mushtaq, et al.
Published: (2015)
by: Ali, Mushtaq, et al.
Published: (2015)
Similar Items
-
Study of graphical authentication system based on persuasive rotation, resizing and cued click point (GUAS)
by: Zolkipli, Mohamad Fadli
Published: (2014) -
Android: S-Based Technique in Mobile Malware Detection
by: Rahiwan Nazar, Romli, et al.
Published: (2018) -
Intrusion-Detection System Based on Fast Learning Network in Cloud Computing
by: Mohammed Hasan, Ali, et al.
Published: (2018) -
Understanding the root of attack in android malware
by: Rahiwan Nazar, Romli, et al.
Published: (2018) -
Managing educational resource-student information systems using BVAGQ fragmented database replication model
by: Noraziah, Ahmad, et al.
Published: (2011)