Search Results - (( developing digital learning algorithm ) OR ( java application design algorithm ))
Search alternatives:
- developing digital »
- learning algorithm »
- application design »
- digital learning »
- java application »
- design algorithm »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
2
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
3
Old Jawi manuscript: Digital recognition / Zaidi Razak
Published 2016“…The information gathered is useful for the development of a line segmentation algorithm, a new character segmentation algorithm, as well as a recognition algorithm which is based on the use of a unique code and Hamming distance calculation. …”
Get full text
Get full text
Thesis -
4
-
5
Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework
Published 2004“…Java Media Framework library and the RTP protocol for audio transmission were used as development tools.The developed system designed in this thesis together with experimental results proved that the system could be implemented successfully. …”
Get full text
Get full text
Thesis -
6
Machine learning based return prediction for digital financial portfolios
Published 2025“…The machine learning algorithm is introduced to optimize the digital financial portfolio investment return prediction system. …”
Get full text
Get full text
Get full text
Article -
7
The Determinant Factors for the Issuance of Central Bank Digital Currency (CBDC) in Malaysia using Machine Learning Framework
Published 2024“…The overall CentralBank Digital Currency Project Index (CBDCPI) was selected as a target variable,while two machine learning algorithms, Random Forest and XGBoost were utilized to identify the determining variables. …”
Get full text
Get full text
Get full text
Article -
8
-
9
-
10
Computational Thinking (Algorithms) Through Unplugged Programming Activities: Exploring Upper Primary Students’ Learning Experiences
Published 2021“…A total of 31 students from a rural primary school were exposed to the learning about the algorithm concept (an aspect of CT skills) via UPA learning materials. …”
Get full text
Get full text
Get full text
Get full text
Article -
11
The determinant factors for the issuance of Central Bank Digital Currency (CBDC) in Malaysia using machine learning framework
Published 2024“…The overall Central Bank Digital Currency Project Index (CBDCPI) was selected as a target variable, while two machine learning algorithms, Random Forest and XGBoost were utilized to identify the determining variables. …”
Get full text
Get full text
Get full text
Get full text
Article -
12
Isolated digit speech recognition in Malay language using Neuro-Fuzzy approach
Published 2009“…In this paper we discuss the development and implementation of an automated speaker-independent isolated Malay digit speech recognition system. …”
Get full text
Get full text
Conference or Workshop Item -
13
Accuracy of advanced deep learning with tensorflow and keras for classifying teeth developmental stages in digital panoramic imaging
Published 2022“…Background: This study aims to propose the combinations of image processing and machine learning model to segment the maturity development of the mandibular premolars using a Keras-based deep learning convolutional neural networks (DCNN) model. …”
Get full text
Get full text
Get full text
Get full text
Article -
14
Design Of Robot Motion Planning Algorithm For Wall Following Robot
Published 2006Get full text
Get full text
Monograph -
15
Improving hand written digit recognition using hybrid feature selection algorithm
Published 2022“…Therefore, many researchers have applied and developed various machine learning algorithms that could efficiently tackle the handwritten digit recognition problem. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
16
Recognize Hate Speech On Twitter Using Machine Learning
Published 2024“…Convolutional Neural Network (CNN) is a frequent-deep learning algorithm that is powerful in classifying image and text data, the system analyses individual tweets in order to determine if it contains hate speech. …”
Get full text
Get full text
Get full text
Get full text
Article -
17
-
18
A conceptual Malaysian private healthcare university-of-the-future business model: staying relevant in the digital and post-covid era
Published 2022“…The results from the analysis and design of the BMC and SC indicate that the principal changes required to digitally transform the university to a UotF include: the adoption of an open learning system for flexible and lifelong learning; transitioning the campus to a more 'smart', eco-friendly and sustainable campus; incorporating the latest artificial intelligence, machine learning algorithms, and data analytics to improve the university‘s management systems and enhance delivery mechanisms for teaching and learning; and to improve community engagement relationships and partnerships to deliver value to the economic, health and safety of the society, as well as to leverage the open learning system to provide curated courses to niche categories of students locally and globally.…”
Get full text
Get full text
Get full text
Article -
19
Network game (Literati) / Chung Mei Kuen
Published 2003“…The main aspect of this thesis is to produce a networked gaming system, which process players. requested to play the game and enabling users to play the graphical game with people through the network. The algorithm design and implementation method must not only be workable, but also highly efficient in terms of execution speed and response time. …”
Get full text
Get full text
Thesis -
20
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…The application is designed to satisfy the user friendly interfaces and intent to be used by the end user without having the advanced knowledge in mobile security. …”
Get full text
Get full text
Conference or Workshop Item
