Search Results - (( developing information through algorithm ) OR ( java implication based algorithm ))

Refine Results
  1. 1
  2. 2

    The development of virtual product life cycle design tool using artificial intelligence technique by Harun, Habibollah, Ismail @ Ishak, Hasrul Haidar, Sukimin, Zuraini

    Published 2008
    “…The generated features from code classification algorithm give the information of machining parameter through the mapping algorithm. …”
    Get full text
    Monograph
  3. 3

    Intelligent agent for e-commerce using genetic algorithm / Kok Sun Sun by Kok , Sun Sun

    Published 2000
    “…In order to develop an intelligent agent, various programming techniques are used in achieving the property of self learning, information retrieval and searching algorithm. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Tag clouds algorithm with the inclusion of personality traits by Ahmad Affandi, Supli

    Published 2015
    “…The algorithm was then tested through a black box testing. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    Algorithm for robot writing using character segmentation by Yussof S., Anuar A., Fernandez K.

    Published 2023
    “…Through our experiment, it has been proven that the algorithm developed is able to allow the robotic arm to write. � 2005 IEEE.…”
    Conference Paper
  6. 6

    An indoor based push notification for location-based marketing using bluetooth smart ready technology / Nur Farehah Alias by Alias, Nur Farehah

    Published 2017
    “…Therefore, this project has proposed a method called token based alert notification. There are three algorithm developed for token based alert notification which is tokenization algorithm, token matching algorithm and item identification algorithm. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Encrypted mobile messaging application using 3D-AES block cipher cryptography algorithm / Aida Najihah Mohd Khlubi by Mohd Khlubi, Aida Najihah

    Published 2019
    “…This paper analyzes how information sent through mobile messaging application is being secured. …”
    Get full text
    Get full text
    Student Project
  8. 8

    Hide information usings cryptography based on android platform / Ahmad Farhan Ahmad Husni by Ahmad Husni, Ahmad Farhan

    Published 2013
    “…To solve the problem, a steganography tool is developed to help to hide the secret message before being sent through the internet. …”
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10

    Text normalization algorithm for facebook chats in Hausa language by Jaafar, Zubairu Maitama, Haruna, Usman, Gambo, Abdullahi Ya'u, Thomas, Bimba Andrew, Idris, Norisma, Ya’u Gital, Abdulsalam, Abubakar, Adamu

    Published 2014
    “…The proposed algorithm manually developed dictionary that employ normalization of each non-standard word with its equivalent standard word. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  11. 11

    Virtual reality in algorithm programming course: practicality and implications for college students by Dewi, Ika Parma, Ambiyar, Mursyida, Lativa, Effendi, Hansi, Giatman, Muhammad, Efrizon, Hanafi, Hafizul Fahri, Ali, Siti Khadijah

    Published 2024
    “…The ADDIE model is applied in this study to develop products through the stages of analysis, design, development, implementation, and evaluation. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Agro-ento bioinformation: towards the edge of reality by Syed Hassan, Syed Tajuddin

    Published 2002
    “…Bioinformation, in brief, comprises biology, information algorithms, information technology, and communication protocols. …”
    Get full text
    Get full text
    Inaugural Lecture
  13. 13

    Recognition of isolated elements picture using backpropagation neural network / Melati Sabtu by Sabtu, Melati

    Published 2005
    “…The project used Back-propagation Neural Network for the algorithm to classified images. Images that capture using digital camera will perform through the algorithm to classified images. …”
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15
  16. 16

    Flood Control Distance Vector Hop (FCDV-Hop) localization in wireless sensor networks by Zazali, Azyyati Adiah, Subramaniam, Shamala, Ahmad Zukarnain, Zuriati

    Published 2020
    “…The DV-Hop algorithm obtains the distance information from the unknown nodes to the anchor nodes through the network topology calculation rather than the radio wave signals measurement which are used in the range-based algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Indoor parking location information through Short Message Service (SMS) / Nurul Hidayu Abdul Aziz by Abdul Aziz, Nurul Hidayu

    Published 2010
    “…Indoor Parking Location Information through Short Message Service (SMS) is developing to help the drivers to find back their vehicle using their mobile phone via text messaging technology. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Information Security Analysis and Solution using LSB Steganography and AES Cryptographic Algorithm by Nurul Adha, Oktarini Saputri, Novita Epa, Sari

    Published 2023
    “…Our research presents a method for this study, which involves hiding digital images with color at a depth of 24 bits. Through the development of a system to improve the security and confidentiality of data in the form of critical messages, this study seeks to provide senders with solutions. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Automated update of crowdsourced data in participatory sensing: An application for crowdsourced price information by Syafiq F., Ismail H., Aris H., Yusof S.

    Published 2023
    “…The algorithm was evaluated using a prototype development of a local price-watch information application, CrowdGrocr, in which the algorithm was embedded. …”
    Article
  20. 20