Search Results - (( ((program using) OR (problem using)) content algorithm ) OR ( java application path algorithm ))
Search alternatives:
- content algorithm »
- java application »
- application path »
- path algorithm »
- program using »
-
1
Building an Algorithm for Measuring C Programming Assignments Quality
Published 2008“…The main content of the report is the discussion of the most possible methods used to measure programming assignments quality and how it is related to this project. …”
Get full text
Get full text
Final Year Project -
2
-
3
Smart appointment organizer for mobile application / Mohd Syafiq Adam
Published 2009“…In creating this application, NetBeans IDE 6.5and Java Micro Edition (Java ME) are used. …”
Get full text
Get full text
Thesis -
4
-
5
Visdom: Smart guide robot for visually impaired people
Published 2025“…The system architecture integrates ROS 2 on a Raspberry Pi, with TCP/IP connectivity enabling remote operation. An Android mobile application, developed using Java and the java.net.Socket library, provides an intuitive and accessible user interface for seamless interaction with the robot. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
WURFL detection engine using cosine string similarity algortlhm / Illiasaak Ahmad ... [et al.]
Published 2013Get full text
Get full text
Research Reports -
7
A preliminary study of difficulties in learning java programming for secondary school
Published 2020“…Coding to a specific task by using much complex algorithm is not an easy task as student needs to understand and know how to use it to solve a problem. …”
Get full text
Get full text
Get full text
Article -
8
E-Raser: file shredder application with content replacement by using random words function
Published 2018“…Thus, this study proposed a file shredding application named E-Raser which replacing the content of the file using random words function algorithm. …”
Get full text
Get full text
Get full text
Article -
9
Problem restructuring in interger programming for reduct searching
Published 2003“…The thesis emphasizes mainly on the improvement of the original SIP/DRIP algorithm in term of performance. By using problem restructuring, the searching time and memory are minimized. …”
Get full text
Get full text
Thesis -
10
SEDF: a spoofed email detection framework employed by a lightweight web browser plug-in for detecting the spoofed email / Al Ya@Geogiana Buja...[et al.]
Published 2014“…Therefore, this research will propose the SEDF to overcome the problem of email spoofing. The algorithm use to match the word in the searching period in the mail header is based on The Boyer-Moore. …”
Get full text
Get full text
Research Reports -
11
-
12
Teaching and learning via chatbots with immersive and machine learning capabilities
Published 2019“…Each of these chatbots focuses on different programming concepts or constructs. These chatbots support learning of Java via problem-solving steps through “learning by doing”. …”
Get full text
Get full text
Conference or Workshop Item -
13
Detection of in-car-abandoned children via deep learning algorithm / Mohd Farhan Mohd Pauzi
Published 2022“…Therefore, this study aims to detect the existence of "in-car-abandoned children" using deep learning algorithm. A set of children images model captured and then classified into two (2) classes; children and no-children via Convolutional Neural Network (CNN) classifier. …”
Get full text
Get full text
Thesis -
14
-
15
-
16
Educational video recommender system for computer science students using content-based filtering / Walid Burhani Mohd Zamani
Published 2025“…The objective is to study the content-based algorithm, to develop the prototype of educational video recommendation system using content-based filtering algorithm and to evaluate the performance and accuracy of the content-based filtering algorithm. …”
Get full text
Get full text
Thesis -
17
Optimised content-social based features for fake news detection in social media using text clustering approach
Published 2025“…In general, the process of fake news detection was conducted in two different phases, the topic detection phase using a graph-based unsupervised clustering method based on HFPA and Markov Clustering Algorithm (MCL) called (HFPA-MCL) and the fake news detection phase using an unsupervised clustering method based on K-means algorithm. …”
Get full text
Get full text
Get full text
Thesis -
18
Content-based recommender system for an academic social network / Vala Ali Rohani
Published 2014“…Collaborative and content-based are the recommendation techniques typically used in existing RSs. …”
Get full text
Get full text
Thesis -
19
Implementation of autonomous vehicle navigation algorithms using event-driven programming
Published 2012Get full text
Get full text
Get full text
Conference or Workshop Item -
20
A hybrid intelligent algorithm for solving the bilevel programming models
Published 2011Get full text
Working Paper
