Search Results - (( developing innovative learning algorithm ) OR ( java application design algorithm ))
Search alternatives:
- developing innovative »
- innovative learning »
- learning algorithm »
- application design »
- java application »
- design algorithm »
-
1
-
2
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
3
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
4
Industry 5.0 and Education 5.0: Transforming Vocational Education through Intelligent Technology
Published 2024“…By analyzing the research gaps in personalized learning paths, emotion-driven learning, crossdisciplinary integration, and long-term learning behavior analysis, the paper proposes four improved algorithms: the adaptive learning path generation algorithm, the emotion-driven personalized learning algorithm, the cross-disciplinary knowledge graph algorithm, and the long-term learning behavior prediction algorithm. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
5
-
6
Do CEO and chairman characteristics affect green innovation? evidence from a comparative analysis of machine learning models
Published 2024“…Using the extreme gradient boosting (XGBoost) algorithm, which is at the forefront of machine learning algorithms, this study comprehensively examines the impact of CEO and chairman characteristics on corporate green innovation. …”
Get full text
Get full text
Get full text
Article -
7
The impact of virtual reality on programming algorithm courses on student learning outcomes
Published 2024“…The low learning outcomes of students and the limitations of learning media provide opportunities to develop innovations that can increase student engagement. …”
Get full text
Get full text
Get full text
Article -
8
-
9
Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework
Published 2004“…Java Media Framework library and the RTP protocol for audio transmission were used as development tools.The developed system designed in this thesis together with experimental results proved that the system could be implemented successfully. …”
Get full text
Get full text
Thesis -
10
-
11
-
12
Smart object detection using deep learning algorithm and jetson nano for blind people
Published 2021Get full text
Get full text
Conference or Workshop Item -
13
-
14
Strategic capabilities, innovation strategy and the performance of food and beverage small and medium enterprises
Published 2019“…Similarly, top management, technological, learning and relational capabilities significantly and positively related to SMEs innovation strategy. …”
Get full text
Get full text
Get full text
Thesis -
15
Mobile application for sign language learning with real time feedback
Published 2024“…This project proposes developing an innovative mobile application for interactive sign language learning to benefit both Deaf individuals and hearing loss individuals globally. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
16
Design Of Robot Motion Planning Algorithm For Wall Following Robot
Published 2006Get full text
Get full text
Monograph -
17
-
18
-
19
Network game (Literati) / Chung Mei Kuen
Published 2003“…The main aspect of this thesis is to produce a networked gaming system, which process players. requested to play the game and enabling users to play the graphical game with people through the network. The algorithm design and implementation method must not only be workable, but also highly efficient in terms of execution speed and response time. …”
Get full text
Get full text
Thesis -
20
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…The application is designed to satisfy the user friendly interfaces and intent to be used by the end user without having the advanced knowledge in mobile security. …”
Get full text
Get full text
Conference or Workshop Item
