Search Results - (( developing post integration algorithm ) OR ( java data function algorithm ))

Refine Results
  1. 1

    Fuzzy modeling using Bat Algorithm optimization for classification by Noor Amidah, Ahmad Sultan

    Published 2018
    “…A Sazonov Engine which is a fuzzy java engine is use to apply Bat Algorithm in the experiment. …”
    Get full text
    Get full text
    Get full text
    Undergraduates Project Papers
  2. 2

    Image clustering comparison of two color segmentation techniques by Subramaniam, Kavitha Pichaiyan

    Published 2010
    “…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    A collaborative model for post flood activities exploiting an enhanced expanding neighborhood search algorithm by Hasan, Md Munirul

    Published 2019
    “…The aim of this model is to extend the proximity service (ProSe) and expand integrated global-local information exchange in the post-flood SAR activities. …”
    Get full text
    Get full text
    Thesis
  4. 4

    SANAsms: Secure short messaging system for secure GSM mobile communication by Anuar, N.B., Azlan, I.M., Wahid, A.W.A., Zakaria, O.

    Published 2008
    “…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Web-based RIG performance reporting system using interactive visualization techniques / Amir Hambaly Nasaruddin by Nasaruddin, Amir Hambaly

    Published 2019
    “…For the user to analyze the result, the system provides visual analytics technique which can educate the user on analyzing the result which is drill down and sorting function to educate users. The result of this project is all algorithm for visualizing data is functioning and the output produced from the system is correct and effective. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Integrating of web 2.0 technologies for interactive courseware : data structure and algorithm as case study by Mohd Nurhafeezi, Nordin

    Published 2013
    “…Besides that, the research also aims to develop a prototype for Interactive Courseware using Web 2.0 by integrating Web 2.0 technologies and services and lastly to evaluate the effectiveness and the usability of the project by comparing the pre-test and post-test result and surnmative evaluation respectively. …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  7. 7

    Algorithmic fairness in AI-driven project management for post-conflict and developing regions: a critical review and framework for context-aware AI by Ahmed Al-Azazi, Saleem, Alawag, Aawag Mohsen, Saif, Amin

    Published 2026
    “…However, deploying AI uncritically in the data-poor and socially fragile environments of post-conflict and developing regions creates profound ethical risks. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography by Naji, Ahmed Wathik, Zaidan, B.B., Hameed, Shihab A., O-Khalifa, Othman

    Published 2009
    “…The system includes two main functions; first is the hiding of the information in unused area 2 of PE-file (.EXE file), through the execution of four process (specify the cover file, specify the information file, encryption of the information, and hiding the information) and the second function is the extraction of the hiding information through three process (specify the steno file, extract the information, and decryption of the information) and The proposed system is implemented by using java.…”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Enhancing pineapple cultivar classification: a framework for image quality, feature extraction, and algorithmic refinement by Ab Jabal, Mohamad Faizal, Rozlan, Muhammad Irfan, Suhaimi, Azrina, Hasmy, Harshida

    Published 2025
    “…The proposed algorithmic refinements integrate chromatic and morphological attributes, particularly surface area and optimise logical operators to enhance accuracy. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Challenges of hidden data in the unused area two within executable files by Naji, Ahmed Wathik, Zaidan, A.A., Zaidan, B.B.

    Published 2009
    “…The designed algorithms were intended to help in proposed system aim to hide and retract information (data file) with in unused area 2 of any execution file(exe.file). …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Algorithm-program visualization model : An intergrated software visualzation to support novices' programming comprehension by Affandy

    Published 2015
    “…Taking into account from those main issues, this study introduces the new model of integrated algorithm-program visualization (ALPROV) for developing program comprehension tool. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    Document ranking using information quality criteria in weblog search engine by Azimzadeh, Fatemeh

    Published 2013
    “…A ranking method is developed for the Weblog search engine where the post is considered as the document retrieved. …”
    Get full text
    Get full text
    Thesis
  13. 13

    The Effectiveness Of Steam Integrated Approach Using Scratch Module On Achievement And Computational Thinking In Learning Electricity Concepts by Tan, Wee Ling

    Published 2022
    “…In this research, a quasi-experimental design was employed with pre-test, post-test and delayed post-test of Electricity Achievement Test (EAT) and Computational Thinking Survey (CTS) to collect the quantitative data. …”
    Get full text
    Get full text
    Thesis
  14. 14

    The implementation of post-processing data thinning for multibeam echo sounding data by Mahmud, Mohd. Razali, Mohd. Yusof, Othman

    Published 2006
    “…Comparisons on the final results based on these three algorithms will be discussed in order to decide which algorithm is most favorable to be used in post-processing data thinning for cleaned MBES dataset. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15

    SPY-BOT: Machine learning-enabled post filtering for social network-integrated industrial internet of things by Rahman, Md. Arafatur, Zaman, Nafees, Asyhari, A. Taufiq, Sadat, M. S. Nazmus, Pillai, Prashant, Ruzaini, Abdullah Arshah

    Published 2021
    “…To address those challenges by detecting hazardous contents and create a stable social internet environment within IIoT, a statistical learning-enabled trustworthy analytic tool for human behaviors has been developed in this paper. More specifically, this paper proposes a machine learning (ML)-enabled scheme SPY-BOT, which incorporates a hybrid data extraction algorithm to perform post-filtering that arbitrates the users’ behavior polarity. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    SPY-BOT: Machine learning-enabled post filtering for social network-integrated industrial internet of things by Rahman, Md. Arafatur, Zaman, Nafees, Asyhari, A. Taufiq, Nazmus Sadat, S. M., Pillai, Prashant, Ruzaini, Abdullah Arshah

    Published 2021
    “…To address those challenges by detecting hazardous contents and create a stable social internet environment within IIoT, a statistical learning-enabled trustworthy analytic tool for human behaviors has been developed in this paper. More specifically, this paper proposes a machine learning (ML)-enabled scheme SPY-BOT, which incorporates a hybrid data extraction algorithm to perform post-filtering that arbitrates the users’ behavior polarity. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Efficient multi-UAV coordination via rl: joint path planning and task scheduling for post-disaster UAV-assisted MEC systems by Adnan, Mohd Hirzi, Ahmad Zukarnain, Zuriati, Subramaniam, Shamala K.

    Published 2025
    “…These findings highlight GRLA's robustness and efficiency, validating it as a practical solution for real-world post-disaster UAV coordination. The key contribution of this paper is the development of the GRLA framework, which unifies path planning and task scheduling in UAV-assisted MEC systems under dynamic post-disaster conditions.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Development of Intelligent Leak Detection System Based on Artificial Pressure Transient Signal Using Integrated Kurtosis-Based Algorithm for Z-Filter Technique (I-Kaz) / Hanafi.M.Y... by M.Yusop, Hanafi, Ghazali, M.F., M.Yusof, M.F., W.Hamat, W.S.

    Published 2017
    “…The current paper presented the implementation of Integrated Kurtosis-based Algorithm for z-filter Technique (I-Kaz) to kurtosis ratio (I-Kaz-Kurtosis) for the purpose of self-decision method in selecting IMF with the correct IMF selecting criterion. …”
    Get full text
    Get full text
    Article
  19. 19

    Development of intelligent leak detection system based on artificial pressure transient signal using integrated Kurtosis-based Algorithm for Z-filter Technique (I-Kaz) by Hanafi, M. Yusop, M. F., Ghazali, Mohd Fadhlan, Mohd Yusof, Wan Sofian, Wan Hamat

    Published 2017
    “…The current paper presented the implementation of Integrated Kurtosis-based Algorithm for z-filter Technique (I-Kaz) to kurtosis ratio (I-Kaz-Kurtosis) for the purpose of self-decision method in selecting IMF with the correct IMF selecting criterion. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Quantifying and assessing post-stroke patients' functional capability level for independent daily activities: a review by Abd Mutalib, Mohd Azri, Zainul Azlan, Norsinnira, Norsahperi, Nor Mohd Haziq

    Published 2025
    “…It delves into the existing standards of clinical assessment, explores the integration of sensors in limb rehabilitation prototypes, and observes the mathematical methods and algorithms employed by previous researchers to assess and quantify stroke patients' functional capability automatically. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article