Search Results - (( developing human virtualization algorithm ) OR ( java application testing algorithm ))
Search alternatives:
- virtualization algorithm »
- human virtualization »
- application testing »
- testing algorithm »
- developing human »
- java application »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
2
REDUCING LATENCY IN A VIRTUAL REALITY-BASED TRAINING APPLICATION
Published 2006“…In order to overcome latency problem, this research is an attempt to suggest a new prediction algorithm based on heuristic that could be used to develop a more effective and general system for virtual training applications. …”
Get full text
Get full text
Thesis -
3
Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application
Published 2020“…Performance Testing is used to test the performance of algorithm implementations in applications. …”
Get full text
Get full text
Journal -
4
Using text mining algorithm to detect gender deception based on Malaysian chatroom lingo / Dianne L.M. Cheong and Nur Atiqah Sia Abdullah@Sia Sze Yieng
Published 2006“…Based on this designed text algorithm, a prototype in Visual Basic is developed. …”
Get full text
Get full text
Research Reports -
5
Modeling And Control Of V-Groove Rotary Impact Driver
Published 2020“…A state-flow control algorithm is developed on the model to improve the mentioned shortfalls. …”
Get full text
Get full text
Thesis -
6
-
7
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…The concept of ABS algorithm was firstly studied, including the definition, historical background, and a brief comparison was made between the ABS algorithm with other types of algorithm. …”
Get full text
Get full text
Undergraduates Project Papers -
8
Using text mining algorithm to detect gender deception based on Malaysian chat room lingo / Dianne L. M. Cheong and Nur Atiqah Sia Abdullah @ Sia Sze Yieng
Published 2006“…Based on this algorithm. a prototype in Visual Basic is developed It was tested with /6 documents; each consists of 5 e-mails exchanges of respective individuals. …”
Get full text
Get full text
Get full text
Article -
9
Finger triggered virtual musical instruments
Published 2013“…The developed system has the ability to switch the virtual musical instruments between piano and drum. …”
Get full text
Get full text
Get full text
Article -
10
Finger triggered virtual musical instruments
Published 2012“…The developed system has the ability to switch the virtual musical instruments between piano and drum. …”
Get full text
Get full text
Conference or Workshop Item -
11
Classification System for Heart Disease Using Bayesian Classifier
Published 2007“…This system was developing base on to three main part which is data processing, testing and implementation of the algorithm. In this system a Bayesian algorithm was used in order to implement the system. …”
Get full text
Get full text
Thesis -
12
High performance visualization of human tumor growth software
Published 2008“…The implementation of parallel algorithm based on parallel computing system is used to visualize the growth of human tumour. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
13
Real-Time Stereopsis
Published 2008“…Peoples try to make computer sees as human see. Up today there are manyalgorithm developed and invented by scientist but it's long way to go. …”
Get full text
Get full text
Final Year Project -
14
-
15
-
16
Identifying Students' Summary Writing Strategies Using Summary Sentence Decomposition Algorithm
Published 2011“…In comparison to human performance, the algorithm's performance closely matched that of human with 94 accuracy in identifying the syntax level strategies. …”
Get full text
Get full text
Get full text
Article -
17
Tracking of dynamic arm motion estimation and interaction with fuzzy control
Published 2016“…Considerable effort has been put toward the development of intelligent and natural interfaces be- tween users and computer systems. …”
Get full text
Get full text
Article -
18
Sistem navigasi berasaskan algoritma Dijkstra di dalam persekitaran tiga dimensi
Published 2008“…Hereby, the Dijkstra’s algorithm is tested with the developed 3D navigation network inside the building model. …”
Get full text
Get full text
Get full text
Thesis -
19
Encrypted mobile messaging application using AES block cipher cryptography algorithm / Nur Rasyiqah Zulkifli
Published 2019“…The programming language that is used to write the program is Java Language that will run on android phones. As the result, this project was tested on the functionality of the mobile messaging application. …”
Get full text
Get full text
Student Project -
20
Design Of Robot Motion Planning Algorithm For Wall Following Robot
Published 2006Get full text
Get full text
Monograph
