Search Results - (( developing learning session algorithm ) OR ( java validation using algorithm ))

Refine Results
  1. 1

    Priority and dynamic quantum time algorithms for central processing unit scheduling by Mohammed, Maysoon A.

    Published 2018
    “…Central Processing Unit is scheduled using different types of scheduling algorithms. One of the most widely algorithm used in scheduling with sharing and batch operating systems is Round Robin. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Development of Machine Learning Algorithm for Acquiring Machining Data in Turning Process by Ali Al-Assadi, Hayder M. A.

    Published 2004
    “…Artificial Neural Network (ANN) was selected from Machine Learning Algorithms to be the learning algorithm. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    A Model for Evaluation of Cryptography Algorithm on UUM Portal by Norliana, Abdul Majid

    Published 2004
    “…The simulation model was developed using Active Server Page, JavaScript and SQL 7.0 as database. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…In addition, the randomness of the session key generated from the MLCG is verified using NIST test suite. Besides that, the security of the proposed protocol is validated using the formal analysis tool, AVISPA. …”
    Get full text
    Get full text
    Thesis
  6. 6

    A framework of test case prioritisation in regression testing using particle swarm-artificial bee colony algorithm by Ba-Quttayyan, Bakr Salim Abdullah

    Published 2024
    “…Ten knowledge and domain experts provided positive feedback on the framework's verification, affirming the framework's robustness. Validation was conducted through three experiments involving four Java programs. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Computerised Heuristic Algorithm for Multi-location Lecture Timetabling by Kuan, Huiggy

    Published 2020
    “…This research focuses on multi-location coursework timetabling problem for Master of Science in Human Resource Development (MSc HRD) at the Faculty of Cognitive Sciences and Human Development (FCSHD), Universiti Malaysia Sarawak (UNIMAS). …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    Computational Thinking Through Unplugged Programming Activities : Exploring Students’ Learning Experiences by Lim, Bih Loong

    Published 2019
    “…Studies have shown the effectiveness of UPA in developing CT skills and is comparable to the technology driven learning method. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly by Zulkifly, Ahmad Zuladzlan

    Published 2019
    “…On the Construction phase, the development of the prototype has been started. All the algorithm for the engine has been developed by using Java script language. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Learner’s emotion prediction using production rules classification algorithm through brain computer interface tool by Nurshafiqa Saffah, Mohd Sharif

    Published 2018
    “…Each respondent underwent two mathematical game sessions using a smartphone with a two-minute break in between each session. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization by Mohammad Ata, Karimeh Ibrahim

    Published 2019
    “…The circuits have been designed by proteus, the microcontrollers have been programmed by micro C, and the Graphical User Interface (GUI) has been implemented in Java. Few by electronic components such as RFID, multiplexer, XBee, and servo motors have been used to realize the system. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Secure E-Voting With Blind Signature by Ibrahim, Subariah, Kamat, Maznah, Salleh, Mazleena, Abdul Aziz, Shah Rizan

    Published 2003
    “…The voter’s private key for digital signature is protected by using password-based encryption with SHA and Twofish-CBC algorithm so that only valid voter can use it.…”
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    Teaching and learning via chatbots with immersive and machine learning capabilities by Nantha Kumar Subramaniam

    Published 2019
    “…These chatbots acquired its intelligence through a hybrid approach that combines pattern-matching technique and machine learning algorithm in order to formulate its responses. …”
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14

    Visualisation tool to study malaria transmission using network modelling by Wong,, Ji Yeh

    Published 2014
    “…Java was used to implement the visualisation tool. …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  15. 15

    Identifying the correct articulation point of a Quranic letters of the throat (al-halqu) makhraj by Othman, Ahmad Al Baqir, Ahmad, Salmiah, Badron, Khairayu, Altalmas, Tareq M. K.

    Published 2023
    “…The conventional face-to-face learning can be supported with AI-based system for Quranic teaching and learning. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Mapping Computational Thinking Skills Through Digital Games Co-Creation Activity Amongst Malaysian Sub-urban Children Sub-urban Children by Mohd Kamal, Othman, Syazni, Jazlan, Fatin Afiqah, Yamin, Shaziti, Aman, Fitri Suraya, Mohamad, Nurfarahani, Norman Anuar, Abdulrazak Yahya, Saleh, Ahmad Azaini, Abdul Manaf

    Published 2022
    “…Thirty-six 10–12 year-olds from sub-urban primary schools in Borneo participated in creating games in three separate eight-hour sessions. In addition, one pilot session with five participants was conducted. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17
  18. 18

    Bacteria identification via Artificial Neural Network based-on Bergey’s manual by Ruhaimi, Amirul Hafiiz

    Published 2017
    “…Levenberg Marquardt algorithm based Feed-forward backpropagation with Multilayer perceptron type of ANN was used in the training and learning sessions of the ANN development in order to obtain high accuracy simulation results within short period of time.…”
    Get full text
    Get full text
    Student Project
  19. 19

    Tacit knowledge for business intelligence framework using cognitive-based approach by Surbakti, Herison

    Published 2022
    “…The framework was tested on 23 librarians from several university libraries in West Java and Yogyakarta, Indonesia. The algorithm starts with a content targeted interview to identify the list of problems faced by librarians. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Student resource exchange: a web-based system for sharing educational resources among students by Saw, Hui Loo

    Published 2025
    “…In addition, the platform introduces AI-powered study tools, including automated question generation and flashcards, as well as a built-in smart calendar planner that applies conflict detection and priority-based scheduling algorithms to help students manage study sessions and deadlines effectively. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis