Search Results - (( developing theme function algorithm ) OR ( java identification _ algorithm ))
Search alternatives:
- java identification »
- function algorithm »
- developing theme »
-
1
Identification of microcalcification in mammographic images / Noor Azliza Abdul Shauti
Published 2008“…By using this identification, it can simulate in flexible images post processing and analysis in easy image management using Java aplication. …”
Get full text
Get full text
Thesis -
2
Biometric identification with limited data set
Published 2019Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
3
Face recognition and identification system (FaceRec) / Khew Jye Huei
Published 2004“…It describes the implementation and functions of a working system that performs the recognition and identification of human faces using the implement algorithms. …”
Get full text
Get full text
Thesis -
4
A Model for Evaluation of Cryptography Algorithm on UUM Portal
Published 2004“…The methodology used in this study begun with problem identification, requirement identification, analysed the model process and design the simulation model. …”
Get full text
Get full text
Get full text
Thesis -
5
A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment
Published 2013“…The methodology used consists of theoretical study, design of formal framework on intelligent software quality, identification of Feature Ranking Technique (FRT), construction and evaluation of FRA algorithm. …”
Get full text
Get full text
Get full text
Thesis -
6
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…A GUI is created in a form of JAVA application to display data detected from tag. …”
Get full text
Get full text
Thesis -
7
In silico prediction and validation of Gfap as miR-3099 target in the mouse brain
Published 2017“…Those predicted by at least three algorithms (324 genes) were subjected to DAVID bioinformatics analysis to understand their overall functional themes and representation. …”
Get full text
Get full text
Get full text
Article -
8
A framework of test case prioritisation in regression testing using particle swarm-artificial bee colony algorithm
Published 2024“…This research employed a modified version of the Design Science Research Methodology (DSRM), streamlined into five stages: problem identification, theoretical study, framework development, evaluation, and reporting. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
9
An Agent-Based System with Personalization and Intelligent Assistance Services for Facilitating Knowledge Sharing
Published 2006“…This thesis focuses on automatic interest identification and knowledge member recommendation in order to reduce user’s tasks and ease them to participate in knowledge sharing. …”
Get full text
Get full text
Thesis -
10
Humanizing AI in Higher Education: Rethinking HR, Ethics, and Skill Development for University Employees in the SDG Era
Published 2025“…The results identified three predominant themes: (1) unbalanced ethical frameworks and low transparency in AI-driven hiring and performance appraisal; (2) faculty and staff apprehension due to algorithmic biases, data privacy issues, and a lack of institutional oversight; and (3) an urgent need to develop emotional intelligence, interdisciplinary thinking, and digital sensitivity among employees. …”
Get full text
Get full text
Get full text
Get full text
Article -
11
Artificial intelligence in sustainability reporting / Prof. Dr Corina Joseph
Published 2023“…One of these definitions describes AI as the utilization of automated algorithms, robotics, or machines that mimic human cognitive functions, enabling them to perform tasks such as learning, identifying, analyzing, and problem-solving (Graham et al., 2020). …”
Get full text
Get full text
Article -
12
Mitigation of shoulder-surfing attack on picture-based passwords using falsifying authentication methods / Por Lip Yee
Published 2012“…Two falsifying authentication methods using: (i) penup event and neighbouring connectivity manipulation; and (ii) partial password selection and metaheuristic randomisation algorithm methods, were proposed. The first and second proposed methods were incorporated into the proposed Background Pass-Go (BPG) system and Visual Identification Protocol Professional (VIP Pro) system respectively. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis -
13
Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC
Published 2021“…The offline scheme utilizes a Time-based One-Time Password (TOTP) algorithm to allow users to authenticate to the vehicle without needing an Internet connection once they have registered online when Internet access is available. …”
Get full text
Get full text
Thesis
