Search Results - (( developing theme function algorithm ) OR ( java identification based algorithm ))

  • Showing 1 - 8 results of 8
Refine Results
  1. 1

    A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment by Ruzita, Ahmad

    Published 2013
    “…The result shows that the performance of FRA correlates strongly to PQF model with 98% correlation compared to the Kolmogorov-Smirnov Correlation Based Filter (KSCBF) algorithm with 83% correlation. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    An Agent-Based System with Personalization and Intelligent Assistance Services for Facilitating Knowledge Sharing by Mohd Sharef, Nurfadhlina

    Published 2006
    “…In conclusion, the recommended knowledge network created based on the automatic interest identification has now become medium for users to refer for knowledge sources and later perform knowledge sharing tasks.…”
    Get full text
    Get full text
    Thesis
  3. 3

    A framework of test case prioritisation in regression testing using particle swarm-artificial bee colony algorithm by Ba-Quttayyan, Bakr Salim Abdullah

    Published 2024
    “…The developed framework, grounded in fault-based testing theory, comprises three key components: inputs, prioritization factors, and a prioritization algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    In silico prediction and validation of Gfap as miR-3099 target in the mouse brain by Zainal Abidin, Shahidee, Leong, Jia Wen, Mahmoudi, Marzieh, Nordin, Norshariza, Abdullah, Syahrilnizam, Cheah, Pike See, Ling, King Hwa

    Published 2017
    “…Those predicted by at least three algorithms (324 genes) were subjected to DAVID bioinformatics analysis to understand their overall functional themes and representation. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Mitigation of shoulder-surfing attack on picture-based passwords using falsifying authentication methods / Por Lip Yee by Por, Lip Yee

    Published 2012
    “…Over the years, various picture-based password systems were proposed to exploit the utility of pictures for user authentication. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC by Ismail, Haqi Khalid

    Published 2021
    “…The offline scheme utilizes a Time-based One-Time Password (TOTP) algorithm to allow users to authenticate to the vehicle without needing an Internet connection once they have registered online when Internet access is available. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Humanizing AI in Higher Education: Rethinking HR, Ethics, and Skill Development for University Employees in the SDG Era by Shreeja, Nair, Kritika, Banka, Ankur, Pandya

    Published 2025
    “…The results identified three predominant themes: (1) unbalanced ethical frameworks and low transparency in AI-driven hiring and performance appraisal; (2) faculty and staff apprehension due to algorithmic biases, data privacy issues, and a lack of institutional oversight; and (3) an urgent need to develop emotional intelligence, interdisciplinary thinking, and digital sensitivity among employees. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Artificial intelligence in sustainability reporting / Prof. Dr Corina Joseph by Joseph, Corina

    Published 2023
    “…One of these definitions describes AI as the utilization of automated algorithms, robotics, or machines that mimic human cognitive functions, enabling them to perform tasks such as learning, identifying, analyzing, and problem-solving (Graham et al., 2020). …”
    Get full text
    Get full text
    Article