Search Results - (( developing interactive among algorithm ) OR ( java application during algorithm ))

Refine Results
  1. 1

    SUDOKU HELPER by Abdul Razak, Muhammad Asyraf

    Published 2015
    “…In this paper research, author presents an algorithm to provide a tutorial for any Sudoku player who got stuck during the solving process. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    A cognitive mapping approach in real-time haptic rendering interaction for improved spatial learning ability among autistic people / Kesavan Krishnan by Kesavan , Krishnan

    Published 2024
    “…This research also aims to present a reliable autonomous algorithm that minimizes the issues with localization and navigation skills among autistic people in a HBVE to improve their wayfinding and spatial knowledge. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    User to user topic recommendation model for student social interaction by Ahmad Subhi, Zolkafly

    Published 2025
    “…This predictive analytics model compared single and multi-classifier accuracy in predicting the importance of a topic for an individual. Then, a newly developed algorithm called the Social Recommendation (SAR) algorithm ranked and recommended the best topic for social interaction. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    Mobile game application development using evolutionary algorithms by Ong, Jia Hui

    Published 2014
    “…Evolutionary Algorithms have never been used on mobile applications, thus it gives a novel idea of utilizing Evolutionary Algorithms in developing applications typically in games for mobile platforms. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Modelling complex features from histone modification signatures using genetic algorithm for the prediction of enhancer region by Lee, Nung Kion, Fong, Pui Kwan, Mohd Tajuddin, Abdullah

    Published 2014
    “…Current histone signature is mostly represented using k-mers content features incapable of representing all the possible complex interactions of various DNA segments. The main contributions are, among others: (a) demonstrating that there are complex interactions among sequence segments in the histone regions; (b) developing a parse tree representation of the logical complex features. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Fair Traffic Scheduling and Shaping Algorithms for Diffserv Networks by Mohamed, Mohamed Awad Elshaikh

    Published 2006
    “…In this thesis, I2tswTCM is proposed as an enhanced version of the famous tswTCM marker scheme used in the current DiffServ architecture, this new algorithm improves fairness in the excess bandwidth among different aggregates in a DiffServ networks and it has a better fairness than all other algorithms for different network provision levels. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Talkout : Protecting mental health application with a lightweight message encryption by Gavin Teo Juen

    Published 2022
    “…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  9. 9

    Heuristic task scheduling algorithms for optimal resource utilisation in grid computing by Aldailamy, Ali Y., Maipan-Uku, Jamilu Yahaya, Muhammed, Abdullah

    Published 2020
    “…The main goal of this work is to present an evaluation of resources utilisation for certain heuristic scheduling algorithms in Grid Computing Environment. The results of the two experimental scenarios showed that suf rage algorithm produced the best resource utilisation among the three investigated heuristic scheduling algorithms.…”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Adopting Bees Algorithm for Sequenced Based T-Way Test Data Generation by Kamal Z., Zamli, Mohd Hazli, Mohammed Zabil

    Published 2013
    “…Many interaction test data generation strategies (termed t-way strategies) have been developed over the past fifteen years. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    African buffalo optimization algorithm based t-way test suite generation strategy for electronic-payment transactions by B. Odili, Julius, B. Nasser, Abdullah, A., Noraziah, Abd Wahab, Mohd Helmy, Ahmed, Mashuk

    Published 2022
    “…Experimental procedures indicate that the hybridization of the ABO with these algorithmic components led to faster convergence and greater effectiveness superior to the outcomes of existing techniques, thereby placing the algorithm among the best when compared with other methods/techniques.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12
  13. 13

    African Buffalo Optimization Algorithm Based T-Way Test Suite Generation Strategy for Electronic-Payment Transactions by Odili, Julius Beneoluchi, Noraziah, Ahmad, Nasser, Abdullah B., Abd. Wahab, Mohd Helmy, Ahmed, Mashuk

    Published 2021
    “…Experi-mental procedures indicate that the hybridization of the ABO with these algorithmic com-ponents led to faster convergence and greater effectiveness superior to the outcomes of existing techniques, thereby placing the algorithm among the best when compared with other methods/techniques.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14
  15. 15

    Learner’s emotion prediction using production rules classification algorithm through brain computer interface tool by Nurshafiqa Saffah, Mohd Sharif

    Published 2018
    “…Enhancements in cognitive neuroscience and brain imaging technologies such as Human-Computer Interaction (HCI) have started to provide human with the ability to interact directly with the brain. …”
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17
  18. 18

    A malware analysis and detection system for mobile devices / Ali Feizollah by Ali, Feizollah

    Published 2017
    “…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications by Hydara, Isatou

    Published 2015
    “…This research work was limited to Java based web applications. In future research, the method can be extended to include other programming languages as well as other similar web application security vulnerabilities.…”
    Get full text
    Get full text
    Thesis
  20. 20

    REDUCING LATENCY IN A VIRTUAL REALITY-BASED TRAINING APPLICATION by P ISKANDAR, YULITA HANUM

    Published 2006
    “…In order to overcome latency problem, this research is an attempt to suggest a new prediction algorithm based on heuristic that could be used to develop a more effective and general system for virtual training applications. …”
    Get full text
    Get full text
    Thesis