Search Results - (( (developer OR develop) event selection algorithm ) OR ( java application testing algorithm ))

Refine Results
  1. 1

    Mitigation of shoulder-surfing attack on picture-based passwords using falsifying authentication methods / Por Lip Yee by Por, Lip Yee

    Published 2012
    “…Two falsifying authentication methods using: (i) penup event and neighbouring connectivity manipulation; and (ii) partial password selection and metaheuristic randomisation algorithm methods, were proposed. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
    Get full text
    Get full text
    Final Year Project
  3. 3

    Selection and optimization of peak features for event-related eeg signals classification / Asrul bin Adam by Asrul, Adam

    Published 2017
    “…However, the developed algorithms only consider the selected features from a peak model based on the understanding of the EEG signals characteristics. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    The impact of news sentiment on the stock market fluctuation : the case of selected energy sector by Ling, Wu, Siew, Hock Ow

    Published 2021
    “…We developed a financial news sentiment classifier by combining machine learning algorithms and lexicon-based labelling methods. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5
  6. 6

    Route planner mobile web application for UiTM Malaysia / Suzana Ahmad ... [et al.] by Ahmad, Suzana, Mat Diah, Norizan, Mohamad Kamal, Nor Ashikin, Mohd Jailani, Siti Zalekha

    Published 2009
    “…Djikstra’s algorithm has been used to find the appropriate shortest route from those two selected point. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Sports tournament scheduling using genetic algorithm / Hafeezur Syakir Abdul Motok@Mohd Ridzuan by Abdul Motok@Mohd Ridzuan, Hafeezur Syakir

    Published 2020
    “…In genetic algorithm, there are steps include such as initialize population, selection, crossover, mutation and calculate fitness. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Intership supervisor selection using genetic algorithms by Karim, Junaida

    Published 2015
    “…By using genetic algorithm approach, the priority factors for the assigning faculty supervisor to internship student has been identified and also development model of selection has been done to fulfill the criteria for the selection specified by the FTMK. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application by Yana Aditia, Gerhana, Nur, Lukman, Arief Fatchul, Huda, Cecep Nurul, Alam, Undang, Syaripudin, Devi, Novitasari

    Published 2020
    “…Performance Testing is used to test the performance of algorithm implementations in applications. …”
    Get full text
    Get full text
    Journal
  10. 10
  11. 11
  12. 12
  13. 13

    Implementation of (AES) Advanced Encryption Standard algorithm in communication application by Moh, Heng Huong

    Published 2014
    “…The concept of ABS algorithm was firstly studied, including the definition, historical background, and a brief comparison was made between the ABS algorithm with other types of algorithm. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  14. 14

    Survey on Clustered Routing Protocols Adaptivity for Fire Incidents: Architecture Challenges, Data Losing, and Recommended Solutions by Abbas O.K., Abdullah F., Radzi N.A.M., Salman A.D., Abdulkadir S.J.

    Published 2025
    “…Many clustered routing algorithms have been developed to address various issues like energy efficiency, network lifetime, and hotspot problems. …”
    Article
  15. 15

    Sentiment analysis for malay newspaper (SAMNews) using negative selection algorithm / Nur Amalina Redzuan by Redzuan, Nur Amalina

    Published 2013
    “…This project is implemented based on five phases in methodology part which consists of background study, data collection and preparation, prototype design, prototype development and evaluation and dociunentation. Sentiment Analysis for Malay Newspaper (SAMNews) is constructed using the negative selection algorithm which is able to classify the sentiment in newspaper’s sentences into the polarity (positive, negative or neutral) automatically repose on detectors word. …”
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17

    Development of a Reliable Multicast Protocol in Mobile Ad Hoc Networks by Alahdal, Tariq A. A.

    Published 2008
    “…The first algorithm is developed to avoid the buffer overflow in the FS nodes. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Formulation of model predictive control algorithm for nonlinear processes by Mohd. Yusof, Khairiyah, Hassim, Mimi Haryani, Tan, Sook Li, Ab. Rashid, Siti Rafidah

    Published 2004
    “…An unconstrained MIMO DMC and nonlinear MPC (NNMPC) algorithms were developed using a step response model and two feedforward neural networks respectively. …”
    Get full text
    Get full text
    Monograph
  19. 19

    Classification System for Heart Disease Using Bayesian Classifier by Magendram, Anusha

    Published 2007
    “…This system was developing base on to three main part which is data processing, testing and implementation of the algorithm. In this system a Bayesian algorithm was used in order to implement the system. …”
    Get full text
    Get full text
    Thesis
  20. 20

    A new machine learning-based hybrid intrusion detection system and intelligent routing algorithm for MPLS network by Mohammad Azmi Ridwan, Dr.

    Published 2023
    “…This thesis proposes a hybrid ML-based intrusion detection system (ML-IDS) and ML-based intelligent routing algorithm (ML-RA) for MPLS network. The research is divided into three parts, which are (1) dataset development, (2) algorithm development, and (3) algorithm performance evaluation. …”
    text::Thesis