Search Results - (( developing general based algorithm ) OR ( java identification using algorithm ))

Refine Results
  1. 1

    Mitigation of shoulder-surfing attack on picture-based passwords using falsifying authentication methods / Por Lip Yee by Por, Lip Yee

    Published 2012
    “…Two falsifying authentication methods using: (i) penup event and neighbouring connectivity manipulation; and (ii) partial password selection and metaheuristic randomisation algorithm methods, were proposed. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    Identification of microcalcification in mammographic images / Noor Azliza Abdul Shauti by Abdul Shauti, Noor Azliza

    Published 2008
    “…By using this identification, it can simulate in flexible images post processing and analysis in easy image management using Java aplication. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Face recognition and identification system (FaceRec) / Khew Jye Huei by Khew , Jye Huei

    Published 2004
    “…It describes the implementation and functions of a working system that performs the recognition and identification of human faces using the implement algorithms. …”
    Get full text
    Get full text
    Thesis
  4. 4

    A Model for Evaluation of Cryptography Algorithm on UUM Portal by Norliana, Abdul Majid

    Published 2004
    “…The simulation model was developed using Active Server Page, JavaScript and SQL 7.0 as database. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment by Ruzita, Ahmad

    Published 2013
    “…The methodology used consists of theoretical study, design of formal framework on intelligent software quality, identification of Feature Ranking Technique (FRT), construction and evaluation of FRA algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…The proposed protocol using 64 bits index is proved having the lowest non-unequivocally identification probability. …”
    Get full text
    Get full text
    Thesis
  7. 7

    A framework of test case prioritisation in regression testing using particle swarm-artificial bee colony algorithm by Ba-Quttayyan, Bakr Salim Abdullah

    Published 2024
    “…Regression test case prioritisation (TCP) is used to revalidate modified software, ensuring its quality before release on the digital market. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9

    Adaptive policing and shaping algorithms on inbound traffic using generalized Pareto distribution: article / Nor Azura Ayop by Ayop, Nor Azura

    Published 2016
    “…The objective of this research is to characterize inbound internet traffic collected on real live IP-based campus network. Then, traffic is fitted to best traffic model and percentage level Policing and Shaping algorithm is developed to control the bandwidth used. …”
    Get full text
    Get full text
    Article
  10. 10
  11. 11

    An Agent-Based System with Personalization and Intelligent Assistance Services for Facilitating Knowledge Sharing by Mohd Sharef, Nurfadhlina

    Published 2006
    “…KSFaci is embedded in web environment and is implemented using Java Servlet and runs under Apache server. …”
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13
  14. 14

    Literature Survey On Stereo Vision Disparity Map Algorithms by Rostam Affendi, Hamzah, Haidi, Ibrahim

    Published 2016
    “…The survey also notes the implementation of previous software-based and hardware-based algorithms. Generally, the main processing module for a software-based implementation uses only a central processing unit. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15
  16. 16

    Development of a Prediction Algorithm using Boosted Decision Trees for Earlier Diagnoses on Obstructive Sleep Apnea by Sim, Doreen Ying Ying

    Published 2018
    “…OSA. The prediction algorithms developed are based on the OSA datasets collected mainly from the public hospitals in Selangor, Malaysia. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Slice sampler algorithm for generalized pareto distribution by Rostami, Mohammad, Adam, Mohd Bakri, Yahya, Mohamed Hisham, Ibrahim, Noor Akma

    Published 2018
    “…In this paper, we developed the slice sampler algorithm for the generalized Pareto distribution (GPD) model. …”
    Get full text
    Get full text
    Article
  18. 18

    Iteration strategy and ts effect towards the performance of population based metaheuristics by Nor Azlina, Ab. Aziz, Nor Hidayati, Abdul Aziz, Azlan, Abd Aziz, Tasiransurini, Abdul Rahman, Wan Zakiah, Wan Ismail, Zuwairie, Ibrahim

    Published 2020
    “…A researcher developing a new population-based algorithm need to identify the best strategy so that the performance of the algorithm proposed is maximized.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19
  20. 20