Search Results - (( developing gender based algorithm ) OR ( java application testing algorithm ))
Search alternatives:
- application testing »
- developing gender »
- testing algorithm »
- java application »
- gender based »
-
1
Mitigation of shoulder-surfing attack on picture-based passwords using falsifying authentication methods / Por Lip Yee
Published 2012“…This research was undertaken to develop methods to mitigate shoulder-surfing attack. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis -
2
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
3
Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application
Published 2020“…Performance Testing is used to test the performance of algorithm implementations in applications. …”
Get full text
Get full text
Journal -
4
Using text mining algorithm to detect gender deception based on Malaysian chat room lingo / Dianne L. M. Cheong and Nur Atiqah Sia Abdullah @ Sia Sze Yieng
Published 2006“…Based on this algorithm. a prototype in Visual Basic is developed It was tested with /6 documents; each consists of 5 e-mails exchanges of respective individuals. …”
Get full text
Get full text
Get full text
Article -
5
Using text mining algorithm to detect gender deception based on Malaysian chatroom lingo / Dianne L.M. Cheong and Nur Atiqah Sia Abdullah@Sia Sze Yieng
Published 2006“…Based on this designed text algorithm, a prototype in Visual Basic is developed. …”
Get full text
Get full text
Research Reports -
6
Multichannel optimization with hybrid spectral- entropy markers for gender identification enhancement of emotional-based EEGs
Published 2021“…Firstly, it aims to use both linear and nonlinear features of EEG signals to identify emotional influences on gender behavior. Secondly, it aims to develop an automatic gender recognition model by employing optimization algorithms to identify the most effective channels for gender identification from emotional-based EEG signals. …”
Get full text
Get full text
Article -
7
Gender classification on skeletal remains: efficiency of metaheuristic algorithm method and optimized back propagation neural network
Published 2020“…Thus, this paper proposed metaheuristic algorithms such as Particle Swarm Optimization, Ant Colony Algorithm and Harmony Search Algorithm based feature selection to identify the most significant features of skeleton remains. …”
Get full text
Get full text
Get full text
Article -
8
Gender identification of children using hidden Markov model based on Mel-frequency cepstral coefficient / Adira Ibrahim
Published 2013“…This project aims to develop a system that can identify gender of speakers based on speech signal using Hidden Markov Model (HMM) as a recognizer. …”
Get full text
Get full text
Thesis -
9
-
10
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…The concept of ABS algorithm was firstly studied, including the definition, historical background, and a brief comparison was made between the ABS algorithm with other types of algorithm. …”
Get full text
Get full text
Undergraduates Project Papers -
11
Classification System for Heart Disease Using Bayesian Classifier
Published 2007“…This system was developing base on to three main part which is data processing, testing and implementation of the algorithm. In this system a Bayesian algorithm was used in order to implement the system. …”
Get full text
Get full text
Thesis -
12
-
13
-
14
First Semester Computer Science Students’ Academic Performances Analysis by Using Data Mining Classification Algorithms
Published 2014“…From the experiment, the models develop using Rule Based and Decision Tree algorithm shows the best result compared to the model develop from the Naïve Bayes algorithm. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
15
Encrypted mobile messaging application using AES block cipher cryptography algorithm / Nur Rasyiqah Zulkifli
Published 2019“…The programming language that is used to write the program is Java Language that will run on android phones. As the result, this project was tested on the functionality of the mobile messaging application. …”
Get full text
Get full text
Student Project -
16
Product Recommendation System (Targeted Recommendation using Deep Learning in Computer Vision)
Published 2023“…This report presents a project on developing a product recommendation system that utilizes facial recognition technology to predict a user's age and gender. …”
Get full text
Get full text
Undergraduates Project Papers -
17
Design Of Robot Motion Planning Algorithm For Wall Following Robot
Published 2006Get full text
Get full text
Monograph -
18
Development of Low Cost Heart Rate Monitoring Device and Classification Technique Using Fuzzy Logics Algorithm
Published 2016Get full text
Get full text
Final Year Project -
19
Security Analysis Between Static And Dynamic S-boxes In Block Ciphers
Published 2024Get full text
Article -
20
