Search Results - (( developing behavior visualization algorithm ) OR ( java implementation success algorithm ))

Refine Results
  1. 1

    Pairwise testing tools based on hill climbing algorithm (PTCA) by Lim, Seng Kee

    Published 2014
    “…The actual implementation of the algorithm which is in Java programming language, the program is implemented on Net Bean 7.0.1. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  2. 2

    Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework by Asaad Aref, Ibrahim

    Published 2004
    “…Java Media Framework library and the RTP protocol for audio transmission were used as development tools.The developed system designed in this thesis together with experimental results proved that the system could be implemented successfully. …”
    Get full text
    Get full text
    Thesis
  3. 3

    A Toolkit for Simulation of Desktop Grid Environment by FOROUSHAN, PAYAM CHINI

    Published 2014
    “…A simulator for desktop grid environment has been developed using Java as the implementation language due to its wide popularity. …”
    Get full text
    Get full text
    Final Year Project
  4. 4

    An approach for cross-site scripting detection and removal based on genetic algorithms. by Hydara, Isatou, Md Sultan, Abu Bakar, Zulzalil, Hazura, Admodisastro, Novia

    Published 2014
    “…The proposed approach is, so far, only implemented and validated on Java-based Web applications, although it can be implemented in other programming languages with slight modifications. …”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5
  6. 6
  7. 7

    Cross-site scripting detection based on an enhanced genetic algorithm by Hydara, Isatou, Md Sultan, Abu Bakar, Zulzalil, Hazura, Admodisastro, Novia Indriaty

    Published 2015
    “…The proposed approach is, so far, only implemented and validated on Java-based Web applications, although it can be implemented in other programming languages with slight modifications. …”
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8
  9. 9
  10. 10

    Improved abnormal detection using self-adaptive social force model for visual surveillance by Wan Nur Azhani, W. Samsudin

    Published 2017
    “…So, Self-Adaptive SFM is developed in order to estimate a good quality of interaction forces since it is crucial to achieve better abnormal detection, which represents the behavior of the crowd. …”
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12

    Comparison of performances of Jaya Algorithm and Cuckoo Search algorithm using benchmark functions by Ahmed, Mashuk, Nasser, Abdullah B., Kamal Z., Zamli, Heripracoyo, Sulistyo

    Published 2022
    “…CS and JA have implemented in the same platform (Intellij IDEA Community Edition 2020.2.3) using the same language (Java). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    Customer mobile behavioral segmentation and analysis in telecom using machine learning by Sharaf Addin, Eman Hussein, Admodisastro, Novia Indriaty, Mohd Ashri, Siti Nur Syahirah, Kamaruddin, Azrina, Chew, Yew Chong

    Published 2021
    “…This study aims to identify telecom customer segments by utilizing machine learning and subsequently develop a web-based dashboard. The dashboard visualizes the cluster analysis based on demographics, behavior, and region features. …”
    Get full text
    Get full text
    Article
  14. 14

    Design Of Robot Motion Planning Algorithm For Wall Following Robot by Ali Hassan, Muhamad Khairul

    Published 2006
    “…This project demonstrates the use of Wall Following Algorithm for the development of mobile robot wall-following behaviors. …”
    Get full text
    Get full text
    Monograph
  15. 15

    Path planning for unmanned aerial vehicle (UAV) using rotated accelerated method in static outdoor environment by Shaliza Hayati A. Wahab, Nordin Saad, Azali Saudi, Ali Chekima

    Published 2021
    “…In this study, a fast iterative method known as Rotated Successive Over-Relaxation (RSOR) is introduced. The algorithm is implemented in a self-developed 2D Java tool, UAV Planner. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  16. 16
  17. 17

    Development of generic algorithm in wheel-typed hybrid rocket grain design for performance estimation by Kafafy, Raed, Azami, Muhammad Hanafi, Idres, Moumen, Zaharim, Azami, Sopian, Kamaruzaman

    Published 2012
    “…MATLAB® environment was used to develop the design and performance analysis codes, and visualize the temporal variation of performance characteristics.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  18. 18

    Modeling heterogeneous behaviors with different strategies in a terrorist attack by Le Bi, Tingting Liu, Zhen Liu, Jason Teo, Yumeng Zhao, Yanjie Chai

    Published 2022
    “…Experiments demonstrate that the proposed algorithm can generate practical heterogeneous behaviors that align with existing psychological research findings.…”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Priority and dynamic quantum time algorithms for central processing unit scheduling by Mohammed, Maysoon A.

    Published 2018
    “…In excel, a graph has been produced to show the minimum and maximum values of the new dynamic quantum time after setting the parameters of the proposed formula (priority, burst time and the current quantum time). The proposed algorithms (Priority Dynamic Quantum Time and Multi Priority Dynamic Quantum Time Algorithms) are implemented using JAVA programming language and validated using Key Performance Indicators equations. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Design & Development of a Robotic System Using LEGO Mindstorm by Abd Manap, Nurulfajar, Md Salim, Sani Irwan, Haron, Nor Zaidi

    Published 2006
    “…A prototype of a mobile robot based on Lego successfully implemented by using PIC and can be controlled through voice recognition. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item