Search Results - (( developing interactive extraction algorithm ) OR ( java application service algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
    Get full text
    Get full text
    Final Year Project
  2. 2
  3. 3
  4. 4

    Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework by Asaad Aref, Ibrahim

    Published 2004
    “…A design proposal was outlined to provide an adaptive client/server approach to stream audio contents using Real-Time Transport Protocol (RTP) involving architecture based on the Java Media Framework (JMF) Application Programmable Interfaces (API).RTP protocol is the Internet-standard protocol for the transport of real-time data, including audio and video and can be implemented by using Java Media Framework (JMF). …”
    Get full text
    Get full text
    Thesis
  5. 5

    Development of interactive application for classification of Artocarpus Species by Abdul Ghapar, Nadia

    Published 2020
    “…A Graphical User Interface utilizes a combination of devices and technologies to give a platform where users can interact with and producing information. This study shown the comparative results by using different algorithms which are GLCM, Canny, and Prewitt for all data samples. …”
    Get full text
    Undergraduate Final Project Report
  6. 6

    Development Of Fall Risk Clustering Algorithm In Older People by Wong, Kam Kang

    Published 2020
    “…Therefore, the aim of this study is to develop a clustering-based fall risk algorithm which can provide assistances for clinician in management of falls. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  7. 7

    Social media mining: a genetic based multiobjective clustering approach to topic modelling by Alfred, Rayner, Loo, Yew Jie, Obit, Joe Henry, Lim, Yuto, Haviluddin, Haviluddin, Azman, Azreen

    Published 2021
    “…Recently, several effective supervised and unsupervised machine learning methods have been developed in the domain of topics extraction. However, less works have been conducted in applying multiobjective based algorithm for topic extraction. …”
    Get full text
    Get full text
    Article
  8. 8

    Feature extraction: hand shape, hand position and hand trajectory path by Bilal, Sara Mohammed Osman Saleh, Akmeliawati, Rini

    Published 2011
    “…Algorithms have been developed for extracting these features after segmenting the head and the two hands. …”
    Get full text
    Get full text
    Get full text
    Book Chapter
  9. 9

    Investigation And Development Of Flattening Algorithms For Curved Latent Fingerprint Images by Chong, Bei Wei

    Published 2015
    “…Algorithm that applies ellipse approximation provides better performance as compared with the algorithm that developed based on parabolic approximation. …”
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11

    Development of an effective clustering algorithm for older fallers by Goh, Choon Hian, Wong, Kam Kang, Tan, Maw Pin *, Ng, Siew Cheok, Chuah, Yea Dat, Kwan, Ban Hoe

    Published 2022
    “…The purpose of this study was, therefore, to develop a clustering-based algorithm to determine falls risk. …”
    Get full text
    Get full text
    Article
  12. 12

    Mathematical simulation for 3-dimensional temperature visualization on open source-based grid computing platform by Alias, Norma, Satam, Noriza, Abd. Ghaffar, Zarith Safiza, Darwis, Roziha, Hamzah, Norhafiza, Islam, Md. Rajibul

    Published 2009
    “…The development of this architecture is based on several programming language as it involves algorithm implementation on C, parallelization using Parallel Virtual Machine (PVM) and Java for web services development. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13
  14. 14
  15. 15

    Talkout : Protecting mental health application with a lightweight message encryption by Gavin Teo Juen

    Published 2022
    “…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  16. 16

    Development of hippocampus MRI image segmentation algorithm for progression detection of alzheimer’s disease (AD) by Gilani Mohamed, Mohamed Ahmed

    Published 2022
    “…This study indicates developing an algorithm for detecting and progressing through the hippocampus of patients with Alzheimer's disease in MRI images. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    Social media mining: a genetic based multiobjective clustering approach to topic modelling by Rayner Alfred, Loo Yew Jie, Joe Henry Obit, Yuto Lim, Haviluddin Haviluddin, Azreen Azman

    Published 2021
    “…Recently, several effective supervised and unsupervised machine learning methods have been developed in the domain of topics extraction. However, less works have been conducted in applying multiobjective based algorithm for topic extraction. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…A GUI is created in a form of JAVA application to display data detected from tag. …”
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20

    Extracting Tweets Using R in The Context of Ethical Issues by Mohamed Najid, Mohamad Hafizuddin, Zulkifli, Zahidah, Othman, Roslina, Rokis, Rohaiza

    Published 2021
    “…The simple algorithm is capable to facilitating the process of extracting data from Twitter, such that it easily known to the public tweets that exist in a given time period and this can be used as reference material for further development process. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper