Search Results - (( code applications usage algorithm ) OR ( java application during algorithm ))

Refine Results
  1. 1

    Automatic marking system for programming subject by Chan, Jin Yee

    Published 2023
    “…This application handle execution of anonymous code that could be malicious securely by running the code in an isolate environment. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  2. 2
  3. 3
  4. 4

    SUDOKU HELPER by Abdul Razak, Muhammad Asyraf

    Published 2015
    “…In this paper research, author presents an algorithm to provide a tutorial for any Sudoku player who got stuck during the solving process. …”
    Get full text
    Get full text
    Final Year Project
  5. 5
  6. 6
  7. 7

    Design and implementation of cordic algorithm with sinusoidal pulse width modulation switching strategy by Madzzaini, Nur Sofea Eleena

    Published 2017
    “…In addition, CORDIC algorithm has a low usage of memory space compared to Look Up table (LUT) technique. …”
    Get full text
    Get full text
    Student Project
  8. 8

    Talkout : Protecting mental health application with a lightweight message encryption by Gavin Teo Juen

    Published 2022
    “…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  9. 9

    Applying case reuse and Rule-Based Reasoning (RBR) in object-oriented application framework documentation: Analysis and design by Jani H.M., Lee S.P.

    Published 2023
    “…The main objective of an object-oriented application framework is to promote the reuse of both design and code in the development of new applications. …”
    Conference Paper
  10. 10
  11. 11

    An augmented reality real-time cloud-based remote monitoring algorithm for a manufacturing system / Siti Aisyah Jaafar by Jaafar, Siti Aisyah

    Published 2021
    “…Therefore, in this research, the first objective is to develop an algorithm for a remote AR-IoT monitoring system. The algorithm was designed by utilizing C++ and C# coding language. …”
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13
  14. 14
  15. 15

    A malware analysis and detection system for mobile devices / Ali Feizollah by Ali, Feizollah

    Published 2017
    “…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications by Hydara, Isatou

    Published 2015
    “…This research work was limited to Java based web applications. In future research, the method can be extended to include other programming languages as well as other similar web application security vulnerabilities.…”
    Get full text
    Get full text
    Thesis
  17. 17

    A Model of FPGA-based Direct Torque Controller by Sutikno, Tole, Nik Idris, Nik Rumzi, Jidin, Aiman Zakwan, Jidin , Auzani

    Published 2013
    “…The model is prepared for fast computation, without using of CORDIC algorithm, a soft-core CPU, a transformation from Cartesian-topolar coordinates, and without the help of third-party applications. …”
    Get full text
    Get full text
    Article
  18. 18

    Human activity recognition via accelerometer and gyro sensors by Tee, Jia Lin

    Published 2023
    “…To implement the data engineering system proposed, two mobile applications, SensorData and SensorDataLogger with user-friendly interfaces and intuitive functionalities are developed using Java programming language and Android Studio. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  19. 19

    Solar Photovoltaic Maximum Power Point Tracking via Predictive Technique by ‘Ainaa Nur Batrisyia binti Abdul Rahman, -

    Published 2022
    “…On the other hand, the algorithm would be diligently going through several alteration in order to achieve the stable coding command with varied environment factor. …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  20. 20

    Car plate recognition based on stroke composition technique / Samsul Setumin, Mohd Ikmal Fitri Maruzuki and Shahrul Nizam Ishak. by Setumin, Samsul, Maruzuki, Mohd Ikmal Fitri, Ishak, Shahrul Nizam

    Published 2012
    “…These different approaches are customized for their various applications. In this algorithm however, it comprises two main processes; character extraction and stroke analysis. …”
    Get full text
    Get full text
    Research Reports