Search Results - (( basic computer support algorithm ) OR ( java application customization algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3

    Unit Kesihatan UiTM (Perak) appointment scheduling system using Genetic Algorithm (GA) / Nur Amiera Abdul Rahman by Abdul Rahman, Nur Amiera

    Published 2014
    “…Alhamdulillah, my heartfelt thanks and gratitude to Allah SWT, that he was willing to give a chance with the good health and leisure time to complete this final year project proposal titled Unit Kesihatan UiTM (Perak) Appointment Scheduling System Using Genetic Algorithm (GA). The final year project has been properly drawn for Universiti Teknologi Mara (UiTM), basically for the students to complete the degree program leading to a Bachelor of Science (Hons) in Computer Science. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Human emotion recognition for computer games player using AdaBoost algorithm / Muhamad Nur Adhwa Muhamad Shukri by Muhamad Shukri, Muhamad Nur Adhwa

    Published 2017
    “…The idea present in applicationbased regarding how computer game can effect player emotion to support other methodology in marketing sales known as “Emotion Level” to solve the problem. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Agent-based extraction algorithm for computational problem solving by Rajabi, Maryam

    Published 2015
    “…The agent-based model for CPS has been developed in JADE environment which applied the basic Believe, Desire and Intention (BDI) architecture to support multi-agent system environment. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7
  8. 8
  9. 9

    DSC766: Text Analytics / College of Computing, Informatics and Mathematics by UiTM, College of Computing, Informatics and Mathematics

    Published 2020
    “…Student will learn the basic concepts, principles, and major algorithms in text mining and their potential applications.…”
    Get full text
    Get full text
    Get full text
    Teaching Resource
  10. 10

    Shot boundary detection based on orthogonal polynomial by Abdulhussain, Sadiq H., Ramli, Abd Rahman, Mahmmod, Basheera M., Saripan, Mohd Iqbal, Al-Haddad, Syed Abdul Rahman, Jassim, Wissam A.

    Published 2019
    “…The outcomes of the comparative analysis show the superior performance of the proposed algorithm against other existing algorithms.…”
    Get full text
    Get full text
    Get full text
    Article
  11. 11
  12. 12

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14
  15. 15

    Depression Detection Based on Features of Depressive Behaviour Through Social Media Analytic: A Systematic Literature Review by Mat Ripah N.A., Abdul Latif A., Che Cob Z., Mohd Drus S., Md Anwar R., Mohd Radzi H.

    Published 2024
    “…Furthermore, it is also shown that various machine learning algorithms are used, and the most used are Neural Network and Support Vector Machine. …”
    Conference Paper
  16. 16

    Tree physiology optimization on SISO and MIMO PID control tuning by Halim, A.H., Ismail, I.

    Published 2018
    “…The iterative search of shoot towards better light supported by the root counterparts leads to an optimization idea of TPO algorithm. …”
    Get full text
    Get full text
    Article
  17. 17

    Tree physiology optimization on SISO and MIMO PID control tuning by Halim, A.H., Ismail, I.

    Published 2018
    “…The iterative search of shoot towards better light supported by the root counterparts leads to an optimization idea of TPO algorithm. …”
    Get full text
    Get full text
    Article
  18. 18

    Adaptive security architecture for protecting RESTful web services in enterprise computing environment by Beer, M.I., Hassan, M.F.

    Published 2018
    “…In this modern era of enterprise computing, the enterprise application integration (EAI) is a well-known industry-recognized architectural principle that is built based on loosely coupled application architecture, where service-oriented architecture (SOA) is the architectural pattern for the implementation of EAI, whose computational elements are called as â��services.â�� Though SOA can be implemented in a wide range of technologies, the web services implementation of SOA becomes the current selective choice due to its simplicity that works on basic Internet protocols. …”
    Get full text
    Get full text
    Article
  19. 19

    Adaptive security architecture for protecting RESTful web services in enterprise computing environment by Beer, M.I., Hassan, M.F.

    Published 2018
    “…In this modern era of enterprise computing, the enterprise application integration (EAI) is a well-known industry-recognized architectural principle that is built based on loosely coupled application architecture, where service-oriented architecture (SOA) is the architectural pattern for the implementation of EAI, whose computational elements are called as â��services.â�� Though SOA can be implemented in a wide range of technologies, the web services implementation of SOA becomes the current selective choice due to its simplicity that works on basic Internet protocols. …”
    Get full text
    Get full text
    Article
  20. 20