Search Results - (( developing human programmes algorithm ) OR ( java application stemming algorithm ))
Search alternatives:
- application stemming »
- stemming algorithm »
- developing human »
- human programmes »
- java application »
-
1
Computerised Heuristic Algorithm for Multi-location Lecture Timetabling
Published 2020“…This research focuses on multi-location coursework timetabling problem for Master of Science in Human Resource Development (MSc HRD) at the Faculty of Cognitive Sciences and Human Development (FCSHD), Universiti Malaysia Sarawak (UNIMAS). …”
Get full text
Get full text
Get full text
Thesis -
2
Design and development of a programmable painting robot for houses and buildings
“…To Overcome This Difficulty, A Programmable Painter Robotic System Is Proposed, Designed And Developed. …”
Get full text
Get full text
Article -
3
Design and development of a programmable painting robot for houses and buildings
Published 2005“…To overcome this difficulty, a programmable painter robotic system is proposed, designed and developed. …”
Get full text
Get full text
Article -
4
VHDL modeling of EMG signal classification using artificial neural network
Published 2012“…VHDL (Very High Speed Integrated Circuit Hardware Description Language) has been used to model the algorithm implemented into the target device FPGA (Field Programmable Gate Array). …”
Get full text
Get full text
Article -
5
A step towards the development of VHDL model for ANN based EMG signal classifier
Published 2012“…VHDL (Very High Speed Integrated Circuit Hardware Description Language) has been used to model the algorithm and which can be implemented into the target device FPGA (Field Programmable Gate Array). …”
Get full text
Get full text
Get full text
Proceeding Paper -
6
Unleashing the pontential: Empowering Artificial Intelligence (AI) with Misty II Robot
Published 2023“…It is specifically designed for human-robot and robot-robot interactions, vision algorithms, supervised or autonomous control, and voice recognition. …”
Get full text
Get full text
Get full text
Article -
7
-
8
A Malay Chatterbot
Published 2005“…This is to make sure that A.M.I.R.A will still following the famous idea of the "imitation game" (Turing, 1950), which chatterbots are developed with the aim of fooling (at least temporarily) a human into thinking they are talking to another person. …”
Get full text
Get full text
Final Year Project -
9
Implementation of Hybrid Indexing, Clustering and Classification Methods to Enhance Rural Development Programme in South Sulawesi
Published 2024“…The village assistance programme can motivate and engage rural communities during the participatory and transparent phase of village development. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
10
Design and development of high performance swa cell design for local DNA sequence alignment
Published 2017“…The performance of the DNA sequence alignment system strongly depends on the algorithm, design architecture and accelerator performance. …”
Get full text
Get full text
Thesis -
11
Three-dimensional structure of Human Epididymis Protein 4 (HE4): a protein modelling of an ovarian cancer biomarker through in silico approach
Published 2024“…PROCHECK and ERRAT programmes were employed to assess the structure quality. …”
Get full text
Get full text
Get full text
Get full text
Article -
12
The prevalence and functional impact of rare genomic copy number variation in hypertension-related left ventricular hypertrophy / Julia Ashazila Mat Jusoh
Published 2020“…In conclusion, more than a quarter of hypertensive male Malaysians had LVH and genetic factor (rare CNV) plays a contributing factor to the development of HT LVH+ through alteration of the functional regulation of foetal cardiac gene programme. …”
Get full text
Get full text
Thesis -
13
-
14
-
15
Security testing of web applications for detecting and removing second-order SQL injection vulnerabilities
Published 2022“…Hence, the actual fixing process of any vulnerabilities is left for the human developer to handle. However, manual removal of such vulnerabilities is tedious, errorprone, and costly. …”
Get full text
Get full text
Thesis
