Search Results - (( developing theme function algorithm ) OR ( java identification _ algorithm ))

  • Showing 1 - 13 results of 13
Refine Results
  1. 1

    Identification of microcalcification in mammographic images / Noor Azliza Abdul Shauti by Abdul Shauti, Noor Azliza

    Published 2008
    “…By using this identification, it can simulate in flexible images post processing and analysis in easy image management using Java aplication. …”
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3

    Face recognition and identification system (FaceRec) / Khew Jye Huei by Khew , Jye Huei

    Published 2004
    “…It describes the implementation and functions of a working system that performs the recognition and identification of human faces using the implement algorithms. …”
    Get full text
    Get full text
    Thesis
  4. 4

    A Model for Evaluation of Cryptography Algorithm on UUM Portal by Norliana, Abdul Majid

    Published 2004
    “…The methodology used in this study begun with problem identification, requirement identification, analysed the model process and design the simulation model. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment by Ruzita, Ahmad

    Published 2013
    “…The methodology used consists of theoretical study, design of formal framework on intelligent software quality, identification of Feature Ranking Technique (FRT), construction and evaluation of FRA algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…A GUI is created in a form of JAVA application to display data detected from tag. …”
    Get full text
    Get full text
    Thesis
  7. 7

    In silico prediction and validation of Gfap as miR-3099 target in the mouse brain by Zainal Abidin, Shahidee, Leong, Jia Wen, Mahmoudi, Marzieh, Nordin, Norshariza, Abdullah, Syahrilnizam, Cheah, Pike See, Ling, King Hwa

    Published 2017
    “…Those predicted by at least three algorithms (324 genes) were subjected to DAVID bioinformatics analysis to understand their overall functional themes and representation. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    A framework of test case prioritisation in regression testing using particle swarm-artificial bee colony algorithm by Ba-Quttayyan, Bakr Salim Abdullah

    Published 2024
    “…This research employed a modified version of the Design Science Research Methodology (DSRM), streamlined into five stages: problem identification, theoretical study, framework development, evaluation, and reporting. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    An Agent-Based System with Personalization and Intelligent Assistance Services for Facilitating Knowledge Sharing by Mohd Sharef, Nurfadhlina

    Published 2006
    “…This thesis focuses on automatic interest identification and knowledge member recommendation in order to reduce user’s tasks and ease them to participate in knowledge sharing. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Humanizing AI in Higher Education: Rethinking HR, Ethics, and Skill Development for University Employees in the SDG Era by Shreeja, Nair, Kritika, Banka, Ankur, Pandya

    Published 2025
    “…The results identified three predominant themes: (1) unbalanced ethical frameworks and low transparency in AI-driven hiring and performance appraisal; (2) faculty and staff apprehension due to algorithmic biases, data privacy issues, and a lack of institutional oversight; and (3) an urgent need to develop emotional intelligence, interdisciplinary thinking, and digital sensitivity among employees. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Artificial intelligence in sustainability reporting / Prof. Dr Corina Joseph by Joseph, Corina

    Published 2023
    “…One of these definitions describes AI as the utilization of automated algorithms, robotics, or machines that mimic human cognitive functions, enabling them to perform tasks such as learning, identifying, analyzing, and problem-solving (Graham et al., 2020). …”
    Get full text
    Get full text
    Article
  12. 12

    Mitigation of shoulder-surfing attack on picture-based passwords using falsifying authentication methods / Por Lip Yee by Por, Lip Yee

    Published 2012
    “…Two falsifying authentication methods using: (i) penup event and neighbouring connectivity manipulation; and (ii) partial password selection and metaheuristic randomisation algorithm methods, were proposed. The first and second proposed methods were incorporated into the proposed Background Pass-Go (BPG) system and Visual Identification Protocol Professional (VIP Pro) system respectively. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC by Ismail, Haqi Khalid

    Published 2021
    “…The offline scheme utilizes a Time-based One-Time Password (TOTP) algorithm to allow users to authenticate to the vehicle without needing an Internet connection once they have registered online when Internet access is available. …”
    Get full text
    Get full text
    Thesis