Search Results - (( develop computer replication algorithm ) OR ( java effective tool algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3
  4. 4

    A random search based effective algorithm for pairwise test data generation by Sabira, Khatun, K. F., Rabbi, Che Yahaya, Yaakub, Klaib, Mohammad F. J.

    Published 2011
    “…The algorithm is able to support both uniform and non-uniform values effectively with performance better than the existing algorithms/tools in terms of number of generated test cases and time consumption.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Generalization of Map Details within Computer Assisted Cartography by Yusuf, Matharuddin

    Published 1992
    “…subjectivity in generalization, the metamorphasis from manual to digital techniques in cartography has resulted in the development of computer algorithms designed to replicate many tasks previously performed by humans. …”
    Get full text
    Get full text
    Article
  6. 6
  7. 7

    Heavy Transportation Shortest Route using Dijkstra’s algorithm (HETRO) / Nurul Aqilah Ahmad Nezer by Ahmad Nezer, Nurul Aqilah

    Published 2017
    “…The technique used in getting the requirements is by interviewing the company project manager of the company to get the problem statements. The development tools used in developing this project is NetBeans by using Java for the implementation of the coding. …”
    Get full text
    Get full text
    Thesis
  8. 8

    An enhanced ant colony system algorithm for dynamic fault tolerance in grid computing by Saufi, Bukhari

    Published 2020
    “…Most fault tolerance algorithms focus on fault handling techniques such as task reprocessing, checkpointing, task replication, penalty, and task migration. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    Implementation of locust inspired scheduling algorithm with huge number of servers for energy efficiency in a cloud datacenter by Azhar, Nur Huwaina

    Published 2019
    “…Cloudsim is used as Discrete Event Simulation tool and Java as coding language to evaluate LACE algorithm. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…The experiment contains two phases; first phase was conducted against java applications that do not use any protection to determine the ability of reversing tools to read the compiled code. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Face Detection System / Chan Beh Teng by Chan, Beh Teng

    Published 2004
    “…The aim of this project is to replicate on a computer what humans beings are able to do so effortlessly - detect the presence of the faces in their field of vision. …”
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13
  14. 14
  15. 15

    Web-based RIG performance reporting system using interactive visualization techniques / Amir Hambaly Nasaruddin by Nasaruddin, Amir Hambaly

    Published 2019
    “…The result of this project is all algorithm for visualizing data is functioning and the output produced from the system is correct and effective. …”
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17

    Unlocking insights: A comprehensive dataset analysis on the acceptance of computational thinking skills among undergraduate university students through the lens of extended techno... by Rosli, Mohd Shafie, Awalludin, Muhammad Fairuz Nizam, Tau Han, Cheong T, Saleh, Nor Shela, Md Noor, Harrinni

    Published 2024
    “…This high explanatory power positions the dataset as a superior resource for replication, benchmarking, and broader applicability in diverse contexts, thereby enhancing the understanding of computational thinking acceptance across different populations and settings. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Friendship Degree and Tenth Man Strategy: A new method for differentiating between erroneous readings and true events in wireless sensor networks by Adday, Ghaihab Hassan, Subramaniam, Shamala K., Zukarnain, Zuriati Ahmad, Samian, Normalia

    Published 2023
    “…FD-TMS was comprehensively assessed in a simulation environment utilizing a performance analysis tool constructed on Java. The results were compared to the baseline algorithm, highlighting key parameters like false alarms and event detection accuracy. …”
    Get full text
    Get full text
    Article
  19. 19

    Development of a chemical kinetic model for hydroprocessed renwable jet fuel for turbine engines by Kuah, Jie Sheng

    Published 2022
    “…The detailed chemical kinetic models of fuel are developed to investigate the combustion characteristics of the turbine engines in Computational Fluid Dynamics (CFD) simulations. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  20. 20