Search Results - (( developing formative sharing algorithm ) OR ( java application during algorithm ))
Search alternatives:
- developing formative »
- application during »
- formative sharing »
- sharing algorithm »
- java application »
- during algorithm »
-
1
-
2
SUDOKU HELPER
Published 2015“…In this paper research, author presents an algorithm to provide a tutorial for any Sudoku player who got stuck during the solving process. …”
Get full text
Get full text
Final Year Project -
3
A microscopic swarm model simulation and fractal approach towards swarm agent behaviour
Published 2006“…The research was extended to fractal characteristics that share the characteristics of the fractal formation and agent paths. …”
Get full text
Get full text
Get full text
Article -
4
Enhanced weight-based clustering algorithm to provide reliable delivery for VANET safety applications
Published 2019“…In this study, enhanced weight-based clustering algorithm (EWCA) was developed to address these challenges. …”
Get full text
Get full text
Article -
5
Automatic image annotation using color segmentation / Siti 'Aisyah Sa'dan
Published 2009“…The scope of this project is digital image of beach photographs with JPegs format. This project is implemented using a basic KMeans clustering as the algorithm for color segmentation and using direct technique to annotate the colors with the appropriate words by using predefined colors.…”
Get full text
Get full text
Thesis -
6
Talkout : Protecting mental health application with a lightweight message encryption
Published 2022“…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
Get full text
Get full text
Get full text
Academic Exercise -
7
Enhancing a cluster-based TDMA MAC protocol for vehicle-to-vehicle communications / Abubakar Bello Tambawal
Published 2020“…Furthermore, a new algorithm was also developed to provide an efficient CH leadership transition from PCH to SeCH when the PCH can no longer continue with the leadership responsibility. …”
Get full text
Get full text
Get full text
Thesis -
8
-
9
-
10
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis -
11
An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications
Published 2015“…This research work was limited to Java based web applications. In future research, the method can be extended to include other programming languages as well as other similar web application security vulnerabilities.…”
Get full text
Get full text
Thesis -
12
An immunological-based simulation: A case study of risk concentration for mobile spam context assessment
Published 2024Get full text
Get full text
journal::journal article -
13
Human activity recognition via accelerometer and gyro sensors
Published 2023“…To implement the data engineering system proposed, two mobile applications, SensorData and SensorDataLogger with user-friendly interfaces and intuitive functionalities are developed using Java programming language and Android Studio. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
14
Cooperative heterogeneous vehicular clustering for road traffic management / Iftikhar Ahmad
Published 2019“…A cooperative mechanism based on strategic game theory (SGT) is also developed to motivate vehicles to participate in cluster formation and to enforce vehicles to share accessed information and cost of use of the Internet. …”
Get full text
Get full text
Get full text
Thesis -
15
The design and implementation of Malaysian indigenous herbs knowledge management system based on ontology model
Published 2016“…The model also can enhance search formulation in information retrieval of herbal knowledge with ease, fast and accurate.However, the back end databases which is based on the OWL language needs to be transformed to relational database format. The transformation from OWL to Relational database is based on the OWL2DB algorithm guideline will be further discussed in this research.Assisted by the System Development Life Cycle (SDLC) methodology, MiHerbs is expected to help herbal research agencies, private sector and government to store and share their herbal related information via the system to provide an ease information access to public or even people around the world.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
16
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. Ultimately, the algorithm development program designed earlier is linked up directly to the robotic model for program implementation and verification. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
17
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis
