Search Results - (( develop computer replication algorithm ) OR ( java _ normalization algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3
  4. 4

    Generalization of Map Details within Computer Assisted Cartography by Yusuf, Matharuddin

    Published 1992
    “…subjectivity in generalization, the metamorphasis from manual to digital techniques in cartography has resulted in the development of computer algorithms designed to replicate many tasks previously performed by humans. …”
    Get full text
    Get full text
    Article
  5. 5

    Improving resource management with multi-instance broker scheduling algorithm in hierarchical grid computing by Yahaya, Bakri

    Published 2016
    “…The designed modules is in the form of algorithms, GridSim, Java Development Kits and Java Language used to support the design process whereas the Netbeans software serves as the platform to simulate the experiment so as to obtain the results. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    SANAsms: Secure short messaging system for secure GSM mobile communication by Anuar, N.B., Azlan, I.M., Wahid, A.W.A., Zakaria, O.

    Published 2008
    “…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    An enhanced ant colony system algorithm for dynamic fault tolerance in grid computing by Saufi, Bukhari

    Published 2020
    “…Most fault tolerance algorithms focus on fault handling techniques such as task reprocessing, checkpointing, task replication, penalty, and task migration. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly by Zulkifly, Ahmad Zuladzlan

    Published 2019
    “…On the Construction phase, the development of the prototype has been started. All the algorithm for the engine has been developed by using Java script language. …”
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10

    Face Detection System / Chan Beh Teng by Chan, Beh Teng

    Published 2004
    “…The aim of this project is to replicate on a computer what humans beings are able to do so effortlessly - detect the presence of the faces in their field of vision. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Electing the best set of features will help to improve the classifier predictions in terms of the normal and abnormal pattern. The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. …”
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13
  14. 14
  15. 15
  16. 16

    Unlocking insights: A comprehensive dataset analysis on the acceptance of computational thinking skills among undergraduate university students through the lens of extended techno... by Rosli, Mohd Shafie, Awalludin, Muhammad Fairuz Nizam, Tau Han, Cheong T, Saleh, Nor Shela, Md Noor, Harrinni

    Published 2024
    “…This high explanatory power positions the dataset as a superior resource for replication, benchmarking, and broader applicability in diverse contexts, thereby enhancing the understanding of computational thinking acceptance across different populations and settings. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Development of a chemical kinetic model for hydroprocessed renwable jet fuel for turbine engines by Kuah, Jie Sheng

    Published 2022
    “…The detailed chemical kinetic models of fuel are developed to investigate the combustion characteristics of the turbine engines in Computational Fluid Dynamics (CFD) simulations. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  18. 18
  19. 19

    Al-Istikhlāf framework in the age of artificial intelligence: reclaiming the human identity and responsibility in the digital era by Wan Ismail, Hidayah, Abdelaziz, Berghout

    Published 2025
    “…Drawing on Qur’ānic exegesis, classical Islamic scholarship, and contemporary AI ethics, it contrasted natural intelligence with machine computation and highlighted the unique moral, spiritual, and teleological dimensions of humanity that cannot be replicated by algorithms. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    A multi-filter feature selection in detecting distributed denial-of-service attack by Yon, Yi Jun, Leau, Yu-Beng, Suraya Alias, Park, Yong Jin

    Published 2019
    “…In addition, the proposed M2FS method is developed through WEKA API with Java Programming language using the IDE of Eclipse Java. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item