Search Results - (( java adaptation optimization algorithm ) OR ( software information needs algorithm ))

Refine Results
  1. 1
  2. 2

    Implementation of AES algorithm into information investigation autopsy (IIA) / Ahmad Wafiy Hamad Zaki by Hamad Zaki, Ahmad Wafiy Hamad Zaki

    Published 2013
    “…Information Investigation Autopsy (IIA) is the tools that can captured the information needed on the Local Area Network environment and later needed to be secured, the IIA need a module that can to secure the evidence captured from any harm. …”
    Get full text
    Get full text
    Student Project
  3. 3
  4. 4

    General purpose search and classification algorithms for distributed information access by Siraj, Fadzilah, Wan Ishak, Wan Hussain

    Published 2000
    “…These information need to be organized so that users can access and search the information in the convenient way. …”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5
  6. 6

    Effort Estimation Model for Function Point Measurement by Koh, Tieng Wei

    Published 2007
    “…Various cost estimation models and methods are available to be used for software development process. The COCOMO, an algorithmic model is one example. …”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    PSAT : a pairwise test data generation tool based on simulated annealing algorithm by Goh, Ghee Hau

    Published 2015
    “…To bring high quality software products to the end user, software testing plays important roles and need to be considered during the development stage. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  9. 9

    The performance effect due to varying network topologies on a software-defined network employing the k-shortest path by Linsheng, R., Derahman, M. N., Kadir, M. F. A., Mohamed, M. A., Kamarudin, S.

    Published 2022
    “…However, constraints such as the need to bypass the node which has a high rate of failure exist to prevent the Dijkstra algorithm from meeting this demand. …”
    Get full text
    Get full text
    Article
  10. 10
  11. 11
  12. 12

    Jogging activity recognition using k-NN algorithm by Afifah Ismail

    Published 2022
    “…Jogging activity recognition using the k-NN algorithm is a system that can help users collect information data of user speed movement using speed sensor and give the classification of jogging activity to the user. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  13. 13
  14. 14

    Application Of Bibliometric Analysis on Root Growth Algorithm by Tengku Malim Busu, Tengku Nurul Aimi Balqis, Ahmad Kamaruddin, Saadi, Ahad, Nor Aishah, Md Ghani, Nor Azura, Hamid, Hashibah

    Published 2024
    “…The results of this study have significant implications for increasing the number of practices using the root growth algorithm in future research. Last but not least, bibliometric analysis on the topic of root growth algorithm is needed to identify influential publications, understand research trends, evaluate research impact, and identify potential research gaps in a concise manner, which helps researchers and readers stay informed, make informed decisions, and contribute to the advancement of knowledge in the field.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Software agent as an effective tool for managing the Internet of thing data complexity by Mustafa, M.B., Yusoof, M.A.M.

    Published 2017
    “…The autonomous property of software agent enables it to continuously search for the suitable data that can meet the need and the expectation of the organization in maximizing the marketing effectiveness. …”
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    A comparative analysis of software engineering approaches for sequence analysis by Ahmad, M., Jung, L.T., Zaman, N.

    Published 2013
    “…The proposal describes the concepts, tools, methodologies, and algorithms being used for sequence analysis. The sequences contain the precious information that needs to be mined for useful purposes. …”
    Get full text
    Get full text
    Book
  17. 17
  18. 18
  19. 19
  20. 20