Search Results - (( developing usability model algorithm ) OR ( java implication from algorithm ))
Search alternatives:
- developing usability »
- java implication »
- implication from »
- model algorithm »
- from algorithm »
-
1
-
2
Agent-based extraction algorithm for computational problem solving
Published 2015“…Four agents have been proposed as an agent based model for CPS, which are User_Agent, PAC_Agent, IPO_Agent and Algorithm_Agent. …”
Get full text
Get full text
Thesis -
3
Talkout : Protecting mental health application with a lightweight message encryption
Published 2022“…The project objectives includes:(i) To investigate lightweight message encryption algorithms by benchmarking their efficiency in terms of computation speed and generated cipher text size; (ii) To design and develop the TalkOut mobile application with lightweight message encryption by using prototype software development model.; and (iii) To evaluate the usability performance of the developed proposed TalkOut mobile application using System Usability Scale (SUS) approach. …”
Get full text
Get full text
Get full text
Academic Exercise -
4
Context-Aware Recommender System based on machine learning in tourist mobile application / Nor Liza Saad … [et al.]
Published 2022“…For the initial framework, the tourist mobile application prototype was developed based on Penang tourist areas by using Waterfall Model system development approach. …”
Get full text
Get full text
Get full text
Article -
5
Student-Class (SC) optimization system / Haifaa Mahfuzah Hazalin
Published 2020“…The methodology used to develop this system is a Waterfall Model. The system had been successfully developed following all of 5 phases in the model which are requirement analysis, design, implementation, testing and maintenance. …”
Get full text
Get full text
Thesis -
6
Individual And Ensemble Pattern Classification Models Using Enhanced Fuzzy Min-Max Neural Networks
Published 2014“…Firstly is by enhancing the learning algorithm of a neural-fuzzy network; and secondly by devising an ensemble model to combine the predictions from multiple neural-fuzzy networks using an agent-based framework. …”
Get full text
Get full text
Thesis -
7
AI chatbot system for educational institutions
Published 2023“…This project presents the design and development of an advanced chatbot system powered by deep learning algorithms for intent classification. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
8
3D character reconstruction from 2D orthogonal images
Published 2025“…The proposed algorithm is organized into modular stages, allowing artists and developers to further improving the pipeline by integrating computer vision, AI models and 3D modelling and scripting techniques. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
9
Classification and visualization on eligibility rate of applicant’s LinkedIn account using Naïve Bayes / Nurul Atirah Ahmad
Published 2023“…The dataset is split into training and testing sets to develop the Naive Bayes (NB) model. The NB model achieved a commendable accuracy of 89.8%, indicating good performance in classifying potential job applicants. …”
Get full text
Get full text
Thesis -
10
Intent-IQ: customer’s reviews intent recognition using random forest algorithm
Published 2025“…Data annotation using semi-supervised learning which is self-training technique need to be accomplished as the dataset is unlabeled. Two machine learning model is chosen to build the classification models which are Random Forest (RF) algorithm and Multinomial Naïve Bayes (MNB) algorithm. …”
Get full text
Get full text
Get full text
Article -
11
Target heart rate zone detector during exercise based on real-time facial expression using single shot detection algorithm / Muhammad Azziq Shamsudin, Raihah Aminuddin and Ummu Mar...
Published 2022“…The accuracy of the model is above 70% and the web was graded with B in the usability test by the users. …”
Get full text
Get full text
Get full text
Book Section -
12
Pharmacy Management System (PhaMSys)/ Norfatin Liyana Yussof
Published 2016Get full text
Get full text
Thesis -
13
E-Grocery application with Geolocation and YOLO Algorithm / Ikhwan Nurhakim Zuzalli and Raihana Md Saidi
Published 2021“…The objective of this project is to develop an E-Grocery application using geolocation and YOLO algorithm. …”
Get full text
Get full text
Get full text
Book Section -
14
Classification and visualization of Malaysian fast food restaurant chain based on twitter sentiment analysis / Muhammad Hafeez Hakimi Muhd Zahidi Ridzuan
Published 2023“…Initially, the data was pre-processed, followed by the development, and testing of a classifier model using real-world data. …”
Get full text
Get full text
Thesis -
15
A cognitive mapping approach in real-time haptic rendering interaction for improved spatial learning ability among autistic people / Kesavan Krishnan
Published 2024“…The identified components were then organized into a model-view-controller (MVC) pattern which was adapted from the modern GUI development platform to describe the structure of the HBVE-Framework. …”
Get full text
Get full text
Get full text
Thesis -
16
An automated approach to elicit and validate security requirements of mobile application
Published 2018“…Mobile phone usage has continued to rise,and it is becoming more convenient for users to use mobile applications for booking hotels,conducting online transaction and online payment.In this case,secured applications are required to increase the confidence among mobile users.In order to achieve correct secure application,a correct security requirements needs to be elicited and defined.Additionally,it is also crucial for security requirements of mobile apps to fulfill basic quality attributes such as correct,consistent and complete (3Cs).However,few problems are found in eliciting security requirements for mobile apps.Firstly, most requirements engineers (RE) are identified to have less knowledge and understanding of security requirements attributes,leading to the failure of implementing the 3Cs of security requirements.Secondly,most of the elicitation and the validation of security requirements are conducted at the later stage of the development and leads to poor quality security requirements implementation which might resulted to project failure.Motivated from these problems,the objectives of this thesis are three-folds; 1) To analyze the security requirements for mobile apps, 2) To propose an approach to elicit and end-to-end validation of security requirement,and 3)To evaluate the efficacy in term of correctness and performance as well as usability of the approach.This thesis proposes a new automated approach to assist the elicitation and validation of security requirements.Here an automated tool support called MobiMEReq is also developed.For this, we have adopted Test Driven Development (TDD) methodology with semi-formalized models:i) Essential Use Cases (EUCs) and ii) Essential User Interface (EUI).We then divided our approach into two parts:1)Elicitation and 2)End-to-end validation security requirements.Further,we have developed pattern libraries to assist on the correct elicitation and validation.They are mobile Security attributes pattern library and mobile security pattern library.Then,we have constructed a new algorithm using fuzzy logic to assist on the prioritization of the test for better performance of validation.Finally,a comprehensive evaluation of the approach,comprising experiments of correctness test and usability test were conducted.Here,we have also evaluated the feedback from the industry experts especially on the usability of the automated approach and tool support.In summary,the findings of the evaluations show that our approach is able to contribute to the body of knowledge of mobile security requirements engineering especially in enhancing the performance and correctness level of security attribute elicitation and its usability for end-to-end elicitation and validation.It is found that the approach able to enhance the correctness level of the elicited security attribute compared to the manual approach,and produce correct generation of test.Then,the results of the usability test by the novice and experts show that the approach is useful in eliciting and validating security requirements at the early stage of application development and is able to ease the elicitation and validation process of security requirements of mobile apps.…”
Get full text
Get full text
Get full text
Thesis -
17
Integrating of web 2.0 technologies for interactive courseware : data structure and algorithm as case study
Published 2013“…The intention of the developed courseware is not to replace conventional class, but the develop courseware main objective is to assist students of FCSIT for better understanding towards Data Structure and Algorithms Course (TMC1433) through interactive delivering information.…”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
18
Diabetes risk prediction system and data visualization / Azizah Mohamad Imran and Hawa Mohd Ekhsan
Published 2023“…To determine Diabetes, the prediction model used and compared different machine learning algorithms such as Logistic Regression (LR) and Support Vector Machine (SVM). …”
Get full text
Get full text
Book Section -
19
-
20
