Search Results - (( its application tools algorithm ) OR ( _ application usage algorithm ))*
Search alternatives:
- application tools »
- application usage »
- tools algorithm »
- usage algorithm »
-
1
-
2
A genetic similarity algorithm for searching the Gene Ontology terms and annotating anonymous protein sequences
Published 2008“…To show the applicability of the basic UTMGO, we extend its structure to develop a Gene Ontology -based protein sequence annotation tool named extended UTMGO. …”
Get full text
Get full text
Get full text
Article -
3
-
4
-
5
OPTIMIZATION OF TWO FISH ENCRYPTION ALGORITHM ON FPGA
Published 2004Get full text
Get full text
Final Year Project -
6
Fraud detection in shipping industry based on location using machine learning comparison techniques
Published 2023text::Thesis -
7
ANALYSIS OF STOCK PRICE PREDICTION USING DATA MINING APPROACH
Published 2012“…It is anticipated that this analysis would become a platform for producing a prediction application that is reliable for usage in the future.…”
Get full text
Get full text
Final Year Project -
8
Cluster head selection algorithm using fuzzy logic in multi-tier Wireless Sensor Network for energy efficiency / Wan Isni Sofiah Wan Din
Published 2016“…The performances of MAP are evaluated through comparing its energy usage for data transmission against Low Energy Adaptive Clustering Hierarchy (LEACH) and Stable Election Protocol (SEP). …”
Get full text
Get full text
Thesis -
9
An artificial neural network approach in service life prediction of building components in Malaysia based on local environment and building service load
Published 2007“…The advantages of artificial neural network is employing as a prediction tool. The back-propagation learning algorithm is used as learning model. …”
Get full text
Get full text
Conference or Workshop Item -
10
Green vehicle traffic routing system using ant-based algorithm
Published 2015Get full text
Get full text
Article -
11
-
12
Remotely sensed imagery data application in mangrove forest: a review
Published 2018“…Thus, remote sensing is a highly efficient, low-cost and time-saving technique for mangrove forest measurement. The application of this technique will further add value to the mangrove forest and enhance its in-situ conservation and protection programmes in combating the effects of the rising sea level due to climate change.…”
Get full text
Get full text
Get full text
Article -
13
-
14
-
15
An automated approach to elicit and validate security requirements of mobile application
Published 2018“…Mobile phone usage has continued to rise,and it is becoming more convenient for users to use mobile applications for booking hotels,conducting online transaction and online payment.In this case,secured applications are required to increase the confidence among mobile users.In order to achieve correct secure application,a correct security requirements needs to be elicited and defined.Additionally,it is also crucial for security requirements of mobile apps to fulfill basic quality attributes such as correct,consistent and complete (3Cs).However,few problems are found in eliciting security requirements for mobile apps.Firstly, most requirements engineers (RE) are identified to have less knowledge and understanding of security requirements attributes,leading to the failure of implementing the 3Cs of security requirements.Secondly,most of the elicitation and the validation of security requirements are conducted at the later stage of the development and leads to poor quality security requirements implementation which might resulted to project failure.Motivated from these problems,the objectives of this thesis are three-folds; 1) To analyze the security requirements for mobile apps, 2) To propose an approach to elicit and end-to-end validation of security requirement,and 3)To evaluate the efficacy in term of correctness and performance as well as usability of the approach.This thesis proposes a new automated approach to assist the elicitation and validation of security requirements.Here an automated tool support called MobiMEReq is also developed.For this, we have adopted Test Driven Development (TDD) methodology with semi-formalized models:i) Essential Use Cases (EUCs) and ii) Essential User Interface (EUI).We then divided our approach into two parts:1)Elicitation and 2)End-to-end validation security requirements.Further,we have developed pattern libraries to assist on the correct elicitation and validation.They are mobile Security attributes pattern library and mobile security pattern library.Then,we have constructed a new algorithm using fuzzy logic to assist on the prioritization of the test for better performance of validation.Finally,a comprehensive evaluation of the approach,comprising experiments of correctness test and usability test were conducted.Here,we have also evaluated the feedback from the industry experts especially on the usability of the automated approach and tool support.In summary,the findings of the evaluations show that our approach is able to contribute to the body of knowledge of mobile security requirements engineering especially in enhancing the performance and correctness level of security attribute elicitation and its usability for end-to-end elicitation and validation.It is found that the approach able to enhance the correctness level of the elicited security attribute compared to the manual approach,and produce correct generation of test.Then,the results of the usability test by the novice and experts show that the approach is useful in eliciting and validating security requirements at the early stage of application development and is able to ease the elicitation and validation process of security requirements of mobile apps.…”
Get full text
Get full text
Get full text
Thesis -
16
Evidence-based diagnostic algorithm for visceral leishmaniasis in Bangladesh
Published 2021“…Diagnostic precision and other inherent indicators were considered for index scoring (IS) of performance of tools using factor analysis. A diagnostic algorithm was formulated based on the IS and availability of the tools at different health care facilities of Bangladesh. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
17
University class timetable tool
Published 2022Get full text
Get full text
Final Year Project / Dissertation / Thesis -
18
أخلاقيات توظيف تطبيقات الذكاء الاصطناعي والتحول الرقمي في الإعلام الأردني
Published 2026thesis::doctoral thesis -
19
Mining Of Resource Usage Using Evoc Algorithm In Grid Environment.
Published 2007Get full text
Get full text
Conference or Workshop Item -
20
