Search Results - (( affecting implementation practices algorithm ) OR ( java application during algorithm ))

Refine Results
  1. 1

    SUDOKU HELPER by Abdul Razak, Muhammad Asyraf

    Published 2015
    “…In this paper research, author presents an algorithm to provide a tutorial for any Sudoku player who got stuck during the solving process. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    Real time nonlinear filtered-x lms algorithm for active noise control by Sahib, Mouayad Abdulredha

    Published 2012
    “…However, unlike the other algorithms, NLFXLMS cannot be implemented in real time. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Enhancing indoor positioning service for location based internet of things (IoT): a source selecting approach with error compensation by Chui, Yew Leong, Perumal, Thinagaran, Yaakob, Razali, Kwan, Wei Peng

    Published 2017
    “…An error compensation algorithm also will be applied to eliminate the false signal which will affect the system's accuracy. …”
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    The effectiveness of using the Lattice in multiplication skills among Year 5 in SK Beradek / Muhamad Shaharudin Muhamad Sarip by Muhamad Sarip, Muhamad Shaharudin

    Published 2015
    “…Through the research instruments were implemented, researchers have identified several issues that affect pupils weaknesses in multiplying skills. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Amplitude independent muscle activity detection algorithm of soft robotic glove system for hemiparesis stroke patients using single sEMG channel by Hameed, Husamuldeen Khalid

    Published 2020
    “…The computation efficiency of the proposed algorithm has enabled the implementation of the soft robotic glove system prototype by using simple hardware.…”
    Get full text
    Get full text
    Thesis
  6. 6

    Talkout : Protecting mental health application with a lightweight message encryption by Gavin Teo Juen

    Published 2022
    “…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  7. 7

    Web Algorithm search engine based network modelling of Malaria Transmission by Eze, Monday Okpoto

    Published 2013
    “…The Hypertext Induced Topical Search (HITS) web search algorithm was adapted to implement a search engine, which uses the bipartite contact network as the input. …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    Estimating Depressive Tendencies Of Twitter User Via Social Media Data by Loh, Hooi Teng

    Published 2023
    “…The twitter dataset can be used to test the level of depressive tendencies with three different machine learning algorithms. These three different machine learning algorithms which are Support Vector Machine, XGBoost, and Random Forest. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  9. 9
  10. 10
  11. 11

    Prediction models of heritage building based on machine learning / Nur Shahirah Ja'afar by Ja'afar, Nur Shahirah

    Published 2021
    “…Thus, through the implementation of machine learning, the researcher can analyse the proper and acceptable algorithms that can be used in heritage property price prediction which also are recommended for other researchers. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Predictive modeling of condominium prices using a Particle Swarm Optimization-Random Forest approach / Che Wan Sufia Che Wan Samsudin by Che Wan Samsudin, Che Wan Sufia

    Published 2025
    “…Essential phases of the project include data collection, data preprocessing, and the implementation of the Particle Swarm Optimization-Random Forest price prediction algorithm. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Immunized-evolutionary algorithm based technique for loss control in transmission system with multi-load increment by Shaaya S.A., Musirin I., Sulaiman S.I., Mansor M.H.

    Published 2023
    “…Results obtained from the studies revealed the merit of the proposed IEP; indicating its feasibility for future implementation in practical system. � 2017 Institute of Advanced Engineering and Science. …”
    Article
  14. 14

    Focal and non-focal epilepsy localization: a review by Hussein, Ahmed Faeq, N., Arunkumar, Gomes, Gorakanage Arosha Chandima, Alzubaidi, Abbas K., Habash, Qais Ahmed, Granados, Luz Santamaria, Moreno, Juan Francisco Mendoza, Gonzalez, Gustavo Ramirez

    Published 2018
    “…Generally, the techniques developed for detecting the epileptic seizures were based on tensors, entropy, empirical mode decomposition, wavelet transform and dynamic analysis. The existing algorithms were compared and the need for implementing a practical and reliable new algorithm is highlighted. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    An efficient real-time terrain data organization and visualization algorithm based on enhanced triangle-based level of detail technique by Zamri, Muhamad Najib

    Published 2006
    “…The purpose of this research is to design, develop and implement an algorithm for enhancing the rendering efficiency of triangle-based LOD technique. …”
    Get full text
    Get full text
    Thesis
  16. 16

    A malware analysis and detection system for mobile devices / Ali Feizollah by Ali, Feizollah

    Published 2017
    “…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    Diabetic disease classifier based on three machine learning models / ‘Ayuni Zamri ... [et al.] by Zamri, ‘Ayuni, Darmawan, Mohd Faaizie, Mohamed Hatim, Shahirah, Zainal Abidin, Ahmad Firdaus, Osman, Mohd Zamri

    Published 2022
    “…The aim of this research is to aid the medical professionals to diagnose patients whether the patients is diabetic or not diabetic, by applying machine learning algorithms, and evaluate the results to find the best algorithm to predict diabetic diseases. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications by Hydara, Isatou

    Published 2015
    “…This research work was limited to Java based web applications. In future research, the method can be extended to include other programming languages as well as other similar web application security vulnerabilities.…”
    Get full text
    Get full text
    Thesis
  19. 19

    Teleworking monitoring system using NILM and K-NN algorithms: a strategy for sustainable smart cities by Yang, Chuan Choong, Noh, Adriana, Ibrahim, Siti Noorjannah, Asnawi, Ani Liza, Mohamed Azmin, Nor Fadhillah

    Published 2024
    “…Working from home or teleworking has become a common practice for most office employees during certain special situations such as pandemic. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Human activity recognition via accelerometer and gyro sensors by Tee, Jia Lin

    Published 2023
    “…To implement the data engineering system proposed, two mobile applications, SensorData and SensorDataLogger with user-friendly interfaces and intuitive functionalities are developed using Java programming language and Android Studio. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis