Search Results - (( using vectorisation using algorithm ) OR ( java identification method algorithm ))

  • Showing 1 - 6 results of 6
Refine Results
  1. 1

    3D silhouette rendering algorithms using vectorisation technique from Kedah topography map by Che Mat, Ruzinoor, Nordin, Norani

    Published 2004
    “…The vectorisation software has been used for producing these data. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2
  3. 3
  4. 4

    An Automated System For Classifying Conference Papers by Ngan, Seon Choon Han

    Published 2021
    “…The Knowledge Discovery in Databases (KDD) process was followed as a formal data mining methodology where 1000 AI conference papers were carefully collected, pre-processed and transformed to numerical representations through TF-IDF vectorisation. A randomised stratified 5- fold cross validation was then applied on several data mining algorithms and evaluated using the F-measure as a metric. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  5. 5

    Mitigation of shoulder-surfing attack on picture-based passwords using falsifying authentication methods / Por Lip Yee by Por, Lip Yee

    Published 2012
    “…Prototypes, simulations, observations and interviews were used as the data gathering methods. An offline FOA Java simulation was carried out to evaluate the capability of the MRA method in preventing FOA attack. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC by Ismail, Haqi Khalid

    Published 2021
    “…These existing schemes, however, rely on different types of cryptographic methods that usually have high computation complexity. …”
    Get full text
    Get full text
    Thesis