Search Results - (( developing formative reference algorithm ) OR ( java application during algorithm ))
Search alternatives:
- developing formative »
- application during »
- java application »
- during algorithm »
-
1
SUDOKU HELPER
Published 2015“…In this paper research, author presents an algorithm to provide a tutorial for any Sudoku player who got stuck during the solving process. …”
Get full text
Get full text
Final Year Project -
2
Smart citation manager
Published 2019“…The goals to be achieved included (i) a reference management module to store, manage reference data and create citation and bibliography in formatted to a citation style required for publication. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
3
A Comparative Study of Some Cellular Manufacturing Techniques
Published 2000“…Overall, Bond Energy Algorithm (BEA) was found to be the best cell formation technique.…”
Get full text
Get full text
Article -
4
Trajectory planning and simulation for 3d printing process
Published 2022“…Development of the simulator was started with the development of STL file reader to extract the triangular facets’ vertices from a STL file in ASCII format. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
5
SNR Based DSDV Routing Protocol for MANET
Published 2012“…In this project the Signal-to-Noise (SNR) based routing protocol has been adapted into the standard Destination Sequenced Distance Vector (DSDV) routing algorithm by developing an algorithm to calculate the cumulative average SNR from source to destination and apply the algorithm in the DSDV routing protocol. …”
Get full text
Get full text
Get full text
Thesis -
6
Performance Analysis of Duty-Cycle Division Multiplexing for Optical Fiber Communication Systems
Published 2009“…In this study, the design of DCDM multiplexer and demultiplexer is improved. A new set of algorithm are developed for data recovery in the receiver. …”
Get full text
Get full text
Thesis -
7
Detecting JFIF header using FORHEADER
Published 2011“…In this paper, we introduce three novel algorithms; single-byte-marker, dual-byte-marker and 20-point-reference for JPEG File Interchange Format (JFIF) header detection using a newly introduced FORHEADER model. …”
Get full text
Get full text
Get full text
Article -
8
Talkout : Protecting mental health application with a lightweight message encryption
Published 2022“…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
Get full text
Get full text
Get full text
Academic Exercise -
9
Solving power system state estimation using orthogonal decomposition algorithm / Tey Siew Kian
Published 2009“…The orthogonal decomposition method avoids the formation of the gain matrix by triangularizing it directly with QR factorization and Householder transformation (refer to section 3.3.2),which is found to be numerically more stable. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis -
10
-
11
-
12
System Interface Design For CAD/CAM-Simulink Data Exchange System Using MATLAB
Published 2018“…The proposed CS-DES system enhances data automation through formation of the graphical user input reference interface of the machine tools control system using NC manufacturing codes data as the reference input signal. …”
Get full text
Get full text
Get full text
Article -
13
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis -
14
An analysis of hateful contents detection techniques on social media
Published 2016Get full text
Get full text
Get full text
Conference or Workshop Item -
15
An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications
Published 2015“…This research work was limited to Java based web applications. In future research, the method can be extended to include other programming languages as well as other similar web application security vulnerabilities.…”
Get full text
Get full text
Thesis -
16
Integration Of G-Code With Position Controller Via Interpreter Design Using MATLAB For Milling Machine Application
Published 2019“…Thus, this thesis aims to integrate directly the trajectory in G-code form of *.txt format as input reference for the position controller algorithm designed in MATLAB/Simulink via development of a system interpreter. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
17
Automatic generation of neural game controller using single and bi-objective evolutionary optimization algorithms for RTS Game
Published 2015“…Thus, selective crossover rate and mutation rate from a literature was referred and used in the later experiments. The second experiment result shows both GA and DE algorithms can generate optimal solutions with very high fitness scores but the cost of spawning was extremely high. …”
Get full text
Get full text
Get full text
Thesis -
18
Land Use Changes in Jeli, Kelantan
Published 2013“…Land use maps from supervised classification of satellite imagery and existing land use maps are then digitized into shapefile (.shp) format in ArcGIS software, spatial reference is updated to WGS1984 and accuracy assessment is performed to validate data. …”
Get full text
Undergraduate Final Project Report -
19
Human activity recognition via accelerometer and gyro sensors
Published 2023“…To implement the data engineering system proposed, two mobile applications, SensorData and SensorDataLogger with user-friendly interfaces and intuitive functionalities are developed using Java programming language and Android Studio. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
20
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. Ultimately, the algorithm development program designed earlier is linked up directly to the robotic model for program implementation and verification. …”
Get full text
Get full text
Get full text
Conference or Workshop Item
