Search Results - (( software classification issues algorithm ) OR ( java application stemming algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10

    Software metrics selection model for predicting maintainability of object-oriented software using genetic algorithms by Bakar, Abubakar Diwani

    Published 2016
    “…The study proposes the use of software metric thresholds in the classification process during the GA representation. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Filter-wrapper based feature ranking technique for dynamic software quality attributes by Kamaruddin, Siti Sakira, Yahaya, Jamaiah, Deraman, Aziz, Ahmad, Ruzita

    Published 2012
    “…The existing ranking techniques do not address the issue of redundancy in ranking the software quality attributes. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12
  13. 13

    Detection on ambiguous software requirements specification written in malay using machine learning by Zahrin, Mohd Firdaus

    Published 2017
    “…Four (4) SRS have been collected as our case study and text mining technique is used to classify the ambiguity and unambiguity requirements. Four (4) algorithms have been evaluated to find the suitable classification algorithm for this purpose. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15

    Detection of leak size and its location in a water distribution system by using K-NN / Nasereddin Ibrahim Sherksi by Sherksi, Nasereddin Ibrahim

    Published 2020
    “…This thesis proposes a classification model to detect water leakage, focusing on finding water leakage’s location and size, using K-Nearest Neighbour (K-NN) classification method. …”
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17

    Implementation of lightweight cryptographic primitives by Hammad B.T., Jamil N., Rusli M.E., Z�Aba M.R., Ahmed I.T.

    Published 2023
    “…In this paper we present a comprehensive survey of all lightweight symmetric cryptographic primitives, from hardware and software perspectives. The survey covers analysis of these algorithms and a comparison between these primitives in terms of throughput, number of cycle, comprehensive area, power, and energy. …”
    Article
  18. 18

    Implementation of lightweight cryptographic primitives by Hammad B.T., Jamil N., Rusli M.E., Z�Aba M.R., Ahmed I.T.

    Published 2023
    “…In this paper we present a comprehensive survey of all lightweight symmetric cryptographic primitives, from hardware and software perspectives. The survey covers analysis of these algorithms and a comparison between these primitives in terms of throughput, number of cycle, comprehensive area, power, and energy. …”
    Article
  19. 19

    Register Transfer Level Implementation Of Pooling - Based Feature Extraction For Finger Vein Identification by Mohamed Ali, Mohamed Hassan

    Published 2017
    “…The algorithm was mainly inspired by spatial pyramid pooling in generic image classification combined with PCA. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Balanced Stochastic Realization Algorithm For Development Of Rainfall Model by Azhari, Fahimy

    Published 2014
    “…The forecasts can be used to make decisions about whether warnings of floods should be issued to the general public in advance. In this research, Balanced Stochastic Realization (BSR) subspace algorithm is used to develop a rainfall model for Malaysia. …”
    Get full text
    Get full text
    Thesis