Search Results - (( developing function based algorithm ) OR ( java evaluation techniques algorithm ))

Refine Results
  1. 1

    Mitigation of shoulder-surfing attack on picture-based passwords using falsifying authentication methods / Por Lip Yee by Por, Lip Yee

    Published 2012
    “…To improve the users’ memorability, the upload background picture function and cued colour scheme were proposed for the BPG system; the grid line scaling function and the loose authentication method were proposed for the enhanced BPG system; and the chronological story-based cued recall technique was proposed for the VIP Pro system. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    Fuzzy-based multi-agent approach for reliability assessment and improvement of power system protection by Nadheer Abdulridha, Shalash

    Published 2015
    “…The second agent is a reliability evaluation agent that uses a recursive algorithm to predict the suitability generator based on the frequency and duration reliability indices in each state while the third agent is the storage and transfer of data between the other two agents. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Evolutionary cost-cognizant regression test case prioritization for object-oriented programs by Bello, AbdulKarim

    Published 2019
    “…Afterward evolutionary algorithm (EA) was employed to prioritize test cases based on the rate severity of fault detection per unit test cost. …”
    Get full text
    Get full text
    Thesis
  4. 4

    A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment by Ruzita, Ahmad

    Published 2013
    “…Therefore, FRA using FRT was constructed and the performance of the FRA was evaluated. The methodology used consists of theoretical study, design of formal framework on intelligent software quality, identification of Feature Ranking Technique (FRT), construction and evaluation of FRA algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…Third approach is transforming identifiers to junk code to hide the meaning and increase the complexity of the code. Empirical evaluation was conducted to evaluate the proposed Hybrid Obfuscation Technique. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Factor Strategy Model: Proofs of Prototype Concept for Software Quality Evaluation by Nathan, Darmawan, Ooi, Keng Boon, Chong, Alain Yee Loong, Tan, Boon In

    Published 2010
    “…The objective of this study is to provide software developers some measures to evaluate software quality of a Java program. Studies on software quality requirements, software quality models (as a quantifying measurement technique) and various good design rules are required for. …”
    Get full text
    Get full text
    Article
  7. 7

    Software metrics selection model for predicting maintainability of object-oriented software using genetic algorithms by Bakar, Abubakar Diwani

    Published 2016
    “…The software metric thresholds were used as indication for identifying unsafe design in software engineering. To evaluate this technique, an experiment was conducted on two geospatial systems developed using Java programming language where the Chidamber and Kemerer (CK) metrics were used. …”
    Get full text
    Get full text
    Thesis
  8. 8

    An ensemble learning method for spam email detection system based on metaheuristic algorithms by Behjat, Amir Rajabi

    Published 2015
    “…Recently, various techniques based on different algorithms have been developed. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Face recognition and identification system (FaceRec) / Khew Jye Huei by Khew , Jye Huei

    Published 2004
    “…Several different algorithms have been proposed for computer recognition of human faces. …”
    Get full text
    Get full text
    Thesis
  10. 10

    A block cipher based on genetic algorithm by Zakaria, Nur Hafiza

    Published 2016
    “…In many algorithms which are based on the genetic algorithm approach, diffusion properties using crossover and mutation function are being generated to produce a secure data transmission. …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    An enhancement of multi-factor weighted approach technique in prioritizing test cases by comparing similarity distance by Al-Shaibani, Alaa Alrhman Mohammed Raweh, Ahmad, Johanna, Hassan, Rohayanti, Baharom, Salmi, Antari, Dwinta Suci

    Published 2025
    “…The research experiment has shown the process of calculating the Distance matrix for the sample Java Programs and subsequent evaluation using the mutation testing approach and APFD calculation. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Semiparametric inference procedure for the accelarated failure time model with interval-censored data by Karimi, Mostafa

    Published 2019
    “…The rank-based methods, estimating algorithms, and resampling techniques that are developed do not involve the difficulties of the existing estimating procedures. …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    A genetic algorithm based approach for economic dispatch in power system / Mohd Rozely Kalil by Kalil, Mohd Rozely

    Published 1998
    “…The Genetic Algorithm developed in the project was tested on two objective functions for optimizing the economic dispatch problem, which are the total generation cost and the incremental cost function. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Computation of cryptosystem based on Lucas functions using addition chain by Md Ali, Zulkarnain, Othman, Mohamed, Md. Said, Mohamad Rushdan, Sulaiman, Md. Nasir

    Published 2010
    “…In this paper, an efficient computation algorithm for LUC Cryptosystem is developed. It is based on Addition Chain. …”
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15

    A study on regional GDP forecasting analysis based on radial basis function neural network with genetic algorithm (RBFNN-GA) for Shandong economy by Qing, Zhang, Abdullah, Abdul Rashid, Choo, Wei Chong, Ali, Mass Hareeza

    Published 2022
    “…These basic indicators can comprehensively and effectively reflect a country’s or region’s future economic development. The center of radial basis function neural network and smoothing factor to take a uniform distribution of the random radial basis function artificial neural network will be the focus of this study. …”
    Get full text
    Get full text
    Article
  16. 16

    A Reference Based Surface Defect Segmentation Algorithm For Automatic Optical Inspection System by Wong, Ze-Hao

    Published 2020
    “…Finally, surface defects are segmented from an anomaly heat map which is generated based on histogram distance functions. Results show that the proposed algorithm required a learning dataset size as small as 5 samples and was resistant to learning labelling error up to 50%.…”
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18
  19. 19

    Chebyshev approximation of discrete polynomials and splines by Che Seman, Fauziahanim

    Published 2004
    “…A total of five algorithms based on the Lagrange polynomials and cubic splines have been developed in this work to identify the extreme points. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    Chebyshev approximation of discrete polynomials and splines by Che Seman, Fauziahanim

    Published 2004
    “…A total of five algorithms based on the Lagrange polynomials and cubic splines have been developed in this work to identify the extreme points. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis