Search Results - (( developing e programmes algorithm ) OR ( java application during algorithm ))
Search alternatives:
- application during »
- java application »
- during algorithm »
- developing e »
- e programmes »
-
1
Making programmer effective for software development teams: An extended study
Published 2017“…It was found that extrovert (E) trait programmers can be suitable with E trait team-leaders. …”
Get full text
Get full text
Article -
2
SUDOKU HELPER
Published 2015“…In this paper research, author presents an algorithm to provide a tutorial for any Sudoku player who got stuck during the solving process. …”
Get full text
Get full text
Final Year Project -
3
-
4
Developed method of FPGA-based fuzzy logic controller design with the aid of conventional PID algorithm
Published 2009“…This paper proposes developed method to design a digital fuzzy logic controller with the aid of conventional Proportional – integral – derivative (PID) controller using field programmable gate array (FPGA). …”
Get full text
Get full text
Get full text
Article -
5
Implementation of color filtering on FPGA
Published 2007Get full text
Get full text
Get full text
Conference or Workshop Item -
6
Design of a reconfigurable computing platform
Published 2023“…The RCP utilizes Impulse CoDeveloper which is an electronic system level (ESL) design tool that compiles sequential applications/algorithms in C to synthesizable HDL. …”
Conference paper -
7
Predicting usage for a marketable e-learning portal
Published 2014“…To date, existing e-learning portals focuses on providing various learning materials via online.Such an approach may provide huge benefit to the learners; nevertheless, less value can be obtained by the developers or owners.The knowledge transfer programme provides an insight on how existing e-learning portal can be upgraded.The academia has introduced the industry to a computational modelling that is built upon the behaviour of nature community (i.e bees)The utilization of Artificial Bee Colony algorithm in predicting learners' usage of an e-learning portal provides an indicator to the developers on the portals effectiveness.Such information is then useful in producing a marketable and valuable e-learning portal…”
Get full text
Get full text
Conference or Workshop Item -
8
Talkout : Protecting mental health application with a lightweight message encryption
Published 2022“…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
Get full text
Get full text
Get full text
Academic Exercise -
9
The development of embedded band-stop filter for vibration control of a flexible manipulator
Published 2009“…This project presents an investigation into development of feed forward control scheme for vibration control of a flexible manipulator using band-stop (IIR) filter technique using Xilinx (Spartan 3E) . …”
Get full text
Get full text
Undergraduates Project Papers -
10
-
11
-
12
Implementation of real-time simple edge detection on FPGA
Published 2007Get full text
Get full text
Get full text
Conference or Workshop Item -
13
The development of embedded low-pass filter for vibration control of a flexible manipulator
Published 2009“…This project presents an investigation into developing feedforward control scheme for vibration of a flexible manipulator using low pass (IIR) filter technique using Xilinx ISE 10.1 (Spartan 3E). …”
Get full text
Get full text
Undergraduates Project Papers -
14
Flowshop scheduling using artificial bee colony (ABC) algorithm with varying onlooker bees approaches
Published 2015“…The main objective of this research is to develop a computer program with capability of manipulating the onlooker bee approaches in ABC Algorithm for solving flowshop scheduling problem. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
15
-
16
-
17
-
18
Conference Approval System (e-CoAS) / Nor Hidayah Rahim
Published 2015Get full text
Get full text
Thesis -
19
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis -
20
An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications
Published 2015“…This research work was limited to Java based web applications. In future research, the method can be extended to include other programming languages as well as other similar web application security vulnerabilities.…”
Get full text
Get full text
Thesis
