Now showing items 1-10 of 101
Generic framework for evaluation phase in games development methodologies
(IEEE Computer Society, 2013)
Phishing detection based Associative Classification data mining
Website phishing is considered one of the crucial security challenges for the online community due to the massive numbers of online transactions performed on a daily basis. Website phishing can be described as mimicking a ...
Using Mouse and Keyboard Dynamics to Detect Cognitive Stress During Mental Arithmetic
(Springer International Publishing, 2015)
To build a personalized e-learning system that can deliver adaptive learning content based on student’s cognitive effort and efficiency, it is important to develop a construct that can help measuring perceived mental state, ...
Improving Security in Bring Your Own Device (BYOD) Environment by Controlling Access
With the rapid increase in smartphones and tablets, Bring Your Own Devices (BYOD) has simplified computing by introducing the use of personally owned devices. These devices can be utilised in accessing business enterprise ...
Evaluating software cost estimation models using particle swarm optimisation and fuzzy logic for NASA projects: a comparative study
(Inderscience Publishers, 2010-11)
Bidding for contracts depends mainly on estimated costs of a given project, which makes an accurate estimation of effort and time required very important with great impact on budget computation and project success. Inaccurate ...
Combined course programmes generation in multi-agent e-learning system using policy-based HTN planning
As integration processes have been intensified in the area of higher education, they should be supported by information technologies. A Combined Course Programmes (CCP) generation mechanism based on HTN planning was developed ...