Search Results - (( developing interactive module algorithm ) OR ( java application during algorithm ))

Refine Results
  1. 1
  2. 2

    Integrating Interactive Multimedia Objects in Mobile Augmented Reality for Sarawak Tourism by Lee, Angeline, Ng, Edmund Giap Weng, Tan, Kuan Yin., Siti Shukhaila, Shaharuddin, Syaryfah Fazidawaty, Wan Busrah

    Published 2018
    “…Whereas, audio and video API for Android platform were used to build multimedia based audio and video module. As for interaction module, technique of color picking algorithm was applied. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Interactive learning package for artificial neural network (Demonstration Module) / Camellia Mohd Kamal by Camellia , Mohd Kamal

    Published 2004
    “…Interactive Learning Package for Artificial Neural Network (Demonstration Module) is a learning package that allow the users to learn and enhance the understanding of the ANN subject in more detailed way and apply in the demonstration parts. …”
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5

    SUDOKU HELPER by Abdul Razak, Muhammad Asyraf

    Published 2015
    “…In this paper research, author presents an algorithm to provide a tutorial for any Sudoku player who got stuck during the solving process. …”
    Get full text
    Get full text
    Final Year Project
  6. 6

    Supervisory control and data acquisition system (SCADA) based customized remote terminal unit (RTU) for distribution automation system by Musse, Mohamud Ahmed, Soo, Wai Lian

    Published 2008
    “…RTU will initiate the transaction with the digital input and output modules. Two proprietary software systems are used are to develop algorithm for the controller and to develop HMI for monitoring and controlling functions for the operator.…”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  7. 7
  8. 8

    Development Of Integrated Monitoring System For Re-Electric Vehicle by Kasrul, Abdul Karim, Md Nazri , Othman, Auzani , Jidin, Mohd Zulkifli, Ramli

    Published 2014
    “…In addition the data was recorded during the driving for research purpose and future references, and the safety aspects are embedded in the controller module. The development of the system and its algorithm is described in this paper. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Wireless data gloves Malay sign language recognition system by Tan, Tian Swee, Ariff, Ahmad Kamarul, Shaikh Salleh, Sheikh Hussain, Siew, Kean Seng, Leong, Seng Huat

    Published 2007
    “…This paper describes the structure and algorithm of the whole Wireless Bluetooth Data Gloves Sign Language Recognition System, which is defined as a Human-Computer Interaction (HCI) system. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    Classification of hand gestures from EMG signals / Diaa Albitar by Albitar, Diaa

    Published 2022
    “…Surface EMG signals are used to detect hand gestures and signal them as input module in developing prosthetics for rehabilitation and human machine interaction. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Talkout : Protecting mental health application with a lightweight message encryption by Gavin Teo Juen

    Published 2022
    “…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  12. 12

    An evaluation of Monte Carlo-based hyper-heuristic for interaction testing of industrial embedded software applications. by S. Ahmed, Bestoun, Enoiu, Eduard, Afzal, Wasif, Kamal Z., Zamli

    Published 2020
    “…Hyper-heuristic is a new methodology for the adaptive hybridization of meta-heuristic algorithms to derive a general algorithm for solving optimization problems. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    REDUCING LATENCY IN A VIRTUAL REALITY-BASED TRAINING APPLICATION by P ISKANDAR, YULITA HANUM

    Published 2006
    “…Heuristic algorithm is an important module widely used for humanoid robots and avatars in VR systems. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Web page design for electronic commerce / Lee Fong Wai by Lee , Fong Wai

    Published 2003
    “…Also includes a brief explanation about the interaction of this subsystem with the Online Shopping Submission and Processing Subsystem, which is developed by my teammate. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Customized fault management system for low distribution automation system by Ahmed, Musse Mohamud, Soo, W. L.

    Published 2008
    “…An embedded Ethernet controller is used as remote terminal unit (RTU) to act as converter for human machine interface (HMI)and to interact with the digital input and output modules. …”
    Get full text
    Get full text
    Proceeding Paper
  16. 16

    Dust sweeper robot with controller / Muhammad Irsyaduddin Ahmad Nazri by Ahmad Nazri, Muhammad Irsyaduddin

    Published 2024
    “…The research details the design process, hardware configuration, and the development of the control algorithm governing the robot's movements. …”
    Get full text
    Get full text
    Student Project
  17. 17
  18. 18
  19. 19

    A malware analysis and detection system for mobile devices / Ali Feizollah by Ali, Feizollah

    Published 2017
    “…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications by Hydara, Isatou

    Published 2015
    “…This research work was limited to Java based web applications. In future research, the method can be extended to include other programming languages as well as other similar web application security vulnerabilities.…”
    Get full text
    Get full text
    Thesis