Search Results - (( developing program baru algorithm ) OR ( java identification based algorithm ))

  • Showing 1 - 8 results of 8
Refine Results
  1. 1

    A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment by Ruzita, Ahmad

    Published 2013
    “…The result shows that the performance of FRA correlates strongly to PQF model with 98% correlation compared to the Kolmogorov-Smirnov Correlation Based Filter (KSCBF) algorithm with 83% correlation. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    An Agent-Based System with Personalization and Intelligent Assistance Services for Facilitating Knowledge Sharing by Mohd Sharef, Nurfadhlina

    Published 2006
    “…In conclusion, the recommended knowledge network created based on the automatic interest identification has now become medium for users to refer for knowledge sources and later perform knowledge sharing tasks.…”
    Get full text
    Get full text
    Thesis
  3. 3

    A framework of test case prioritisation in regression testing using particle swarm-artificial bee colony algorithm by Ba-Quttayyan, Bakr Salim Abdullah

    Published 2024
    “…The developed framework, grounded in fault-based testing theory, comprises three key components: inputs, prioritization factors, and a prioritization algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    The Development And Evaluation Of Personalized Learning Material Based On A Profiling Algorithm For Polytechnic Students In Learning Algebra by Mohamed Mokmin, Nur Azlina

    Published 2016
    “…Cadangan ini dilakukan melalui pengiraan algorithma Penaakulan Berasaskan Kes (PBK) dengan mencari persamaan antara profil baru dan profil yang disimpan di dalam pangkalan data. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Mitigation of shoulder-surfing attack on picture-based passwords using falsifying authentication methods / Por Lip Yee by Por, Lip Yee

    Published 2012
    “…Over the years, various picture-based password systems were proposed to exploit the utility of pictures for user authentication. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC by Ismail, Haqi Khalid

    Published 2021
    “…The offline scheme utilizes a Time-based One-Time Password (TOTP) algorithm to allow users to authenticate to the vehicle without needing an Internet connection once they have registered online when Internet access is available. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Operator Training Simulator Using Plantwide Control for Biodiesel Production from Waste Cooking Oil by Shikchand Patle, Dipesh

    Published 2015
    “…Subsequently, both the processes are optimized considering profit, heat duty and organic waste as objectives, and using an Excel-based multi-objective optimization (EMOO) program for the elitist non-dominated sorting genetic algorithm (NSGA-II). …”
    Get full text
    Get full text
    Thesis