Search Results - (( using vectorisation technique algorithm ) OR ( java identification based algorithm ))
Search alternatives:
- vectorisation technique »
- identification based »
- java identification »
-
1
3D silhouette rendering algorithms using vectorisation technique from Kedah topography map
Published 2004“…The vectorisation software has been used for producing these data. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
2
A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment
Published 2013“…The result shows that the performance of FRA correlates strongly to PQF model with 98% correlation compared to the Kolmogorov-Smirnov Correlation Based Filter (KSCBF) algorithm with 83% correlation. …”
Get full text
Get full text
Get full text
Thesis -
3
An Agent-Based System with Personalization and Intelligent Assistance Services for Facilitating Knowledge Sharing
Published 2006“…In conclusion, the recommended knowledge network created based on the automatic interest identification has now become medium for users to refer for knowledge sources and later perform knowledge sharing tasks.…”
Get full text
Get full text
Thesis -
4
A framework of test case prioritisation in regression testing using particle swarm-artificial bee colony algorithm
Published 2024“…The developed framework, grounded in fault-based testing theory, comprises three key components: inputs, prioritization factors, and a prioritization algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
5
Mitigation of shoulder-surfing attack on picture-based passwords using falsifying authentication methods / Por Lip Yee
Published 2012“…Over the years, various picture-based password systems were proposed to exploit the utility of pictures for user authentication. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis -
6
Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC
Published 2021“…The offline scheme utilizes a Time-based One-Time Password (TOTP) algorithm to allow users to authenticate to the vehicle without needing an Internet connection once they have registered online when Internet access is available. …”
Get full text
Get full text
Thesis
