Search Results - (( developing human replication algorithm ) OR ( java implementation during algorithm ))
Search alternatives:
- replication algorithm »
- implementation during »
- java implementation »
- human replication »
- developing human »
- during algorithm »
-
1
Pairwise testing tools based on hill climbing algorithm (PTCA)
Published 2014“…The actual implementation of the algorithm which is in Java programming language, the program is implemented on Net Bean 7.0.1. …”
Get full text
Get full text
Undergraduates Project Papers -
2
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…The circuits have been designed by proteus, the microcontrollers have been programmed by micro C, and the Graphical User Interface (GUI) has been implemented in Java. Few by electronic components such as RFID, multiplexer, XBee, and servo motors have been used to realize the system. …”
Get full text
Get full text
Thesis -
3
Generalization of Map Details within Computer Assisted Cartography
Published 1992“…subjectivity in generalization, the metamorphasis from manual to digital techniques in cartography has resulted in the development of computer algorithms designed to replicate many tasks previously performed by humans. …”
Get full text
Get full text
Article -
4
A Novel Path Prediction Strategy for Tracking Intelligent Travelers
Published 2009“…Experimental works show the capabilities of the developed DSS in human path prediction using both simulated and actual WLAN-based positioning dataset. …”
Get full text
Get full text
Thesis -
5
Talkout : Protecting mental health application with a lightweight message encryption
Published 2022“…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
Get full text
Get full text
Get full text
Academic Exercise -
6
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…The system is capable in operating an off-line programming method, starting from its programming sequences until robotic implementation of the program. During early stages, the research is emphasis more towards designing a robotic system using RoboLab software and C++ programming language. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
7
Data Hiding Techniques In Digital Images
Published 2003“…After all these studies, one of the algorithms in the masking technique is developed and implemented using JAVA program to embed message into true color image with a good quality and higher capacity. …”
Get full text
Get full text
Thesis -
8
Face Detection System / Chan Beh Teng
Published 2004“…The aim of this project is to replicate on a computer what humans beings are able to do so effortlessly - detect the presence of the faces in their field of vision. …”
Get full text
Get full text
Thesis -
9
Multi-floor indoor location estimation system based on wireless local area network
Published 2007“…Before developing the system, study on characteristics of RSS is conducted to help the design, development and implementation of the proposed system. The proposed system is then designed and developed using Java programming language. …”
Get full text
Get full text
Thesis -
10
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis -
11
Al-Istikhlāf framework in the age of artificial intelligence: reclaiming the human identity and responsibility in the digital era
Published 2025“…Drawing on Qur’ānic exegesis, classical Islamic scholarship, and contemporary AI ethics, it contrasted natural intelligence with machine computation and highlighted the unique moral, spiritual, and teleological dimensions of humanity that cannot be replicated by algorithms. The article then applied the al-Istikhlāf framework to assess AI’s impact on identity, psychology, social relations, labour, and spiritual life. …”
Get full text
Get full text
Get full text
Article -
12
Adaptive neurofuzzy inference system for an active transfemoral prosthetic leg using in-socket sensory system / Nur Hidayah Mohd Yusof
Published 2019“…The first part of this work is the development of an Adaptive Neurofuzzy Inference System (ANFIS) - based algorithm to human gait phase recognition. …”
Get full text
Get full text
Get full text
Thesis -
13
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis -
14
Human activity recognition via accelerometer and gyro sensors
Published 2023“…To prevent overfitting, early stopping is used to monitor validation loss during training and dropout rate of 0.3 are applied. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
15
Parameters of Artificial Intelligence (AI) in Fatwa Issuance: A Jurisprudential and Technological Ethics Analysis
Published 2026journal::journal article -
16
Study of hand gesture recognition using impulse radio ultra wideband (IRUWB) radar sensor
Published 2023“…Documentation of the development process ensures the methodology and findings are well-documented for reference and replication. …”
Get full text
Get full text
Get full text
Thesis -
17
Anfis Modelling On Diabetic Ketoacidosis For Unrestricted Food Intake Conditions
Published 2017“…The project has also implemented the optimization process onto the proposed ANFIS model through the hybrid of Genetic Algorithm on the fuzzy membership function of the ANFIS model. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
18
-
19
GLCM correlation approach for blood vessel identification in thermal image
Published 2019“…In this work, healthy children were assigned as subjects prior to the development of the algorithm for thermal imaging analysis to form a reference model. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
20
Development of low-overhead soft error mitigation technique for safety critical neural networks applications
Published 2021“…To address this issue, this study developed a Selective Mitigation Technique based on the standard Triple Modular Redundancy (S-MTTM-R) to determine the model’s vulnerable parts, distinguishing Malfunction and Light-Malfunction errors. …”
Get full text
Get full text
Thesis
