Search Results - (( developing program end algorithm ) OR ( java application new algorithm ))
Search alternatives:
- developing program »
- java application »
- application new »
- end algorithm »
- new algorithm »
- program end »
-
1
CSC126 - Fundamentals of Algorithms and Computer Problem Solving / Faculty of Computer And Mathematical Sciences
Published 2023“…This course is an introduction to problem solving using a computer programming language. It emphasizes on algorithm development and writing computer programs, as well as common good practices in writing programs. …”
Get full text
Get full text
Get full text
Teaching Resource -
2
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
3
Application of genetic algorithm and JFugue in an evolutionary music generator
Published 2025“…This project explores the application of Genetic Algorithms (GA) with JFugue, which is a Java-based music programming library to develop an Evolutionary Music Generator. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
4
A new mobile botnet classification based on permission and API calls
Published 2024Conference Paper -
5
Improvement of surface roughness in end milling of Ti6Al4V by coupling RSM with genetic algorithm
Published 2011“…MATLAB 7.0 toolbox for GA is used to develop GA program. The predicted results are in good agreement with the experimental one and hence the model can be efficiently used to achieve the minimum surface roughness value. …”
Get full text
Get full text
Get full text
Article -
6
-
7
Vision-based robot indoor navigation
Published 2022“…This project aims to develop a vision-based navigation robot using OpenCV and C++ programming language in an indoor environment. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
8
-
9
A New Mobile Botnet Classification based on Permission and API Calls
Published 2024“…Mostly, it attacks Android due to its popularity and high usage among end users. Every day, more and more malicious mobile applications (apps) with the botnet capability have been developed to exploit end users' smartphones. …”
Proceedings Paper -
10
-
11
Text steganalysis using evolution algorithm approach
Published 2012Get full text
Get full text
Get full text
Conference or Workshop Item -
12
WURFL detection engine using cosine string similarity algortlhm / Illiasaak Ahmad ... [et al.]
Published 2013Get full text
Get full text
Research Reports -
13
Fiber-Wireless testbed using software defined radio for protocol and algorithm testing
Published 2023“…Fiber-Wireless (FiWi) network can provide abundant bandwidth capacity and mobility to the end-users. It also eliminates the need of having complete tedious end-to-end fiber installation from the central office to the users, which saves tremendous capital expenditure. …”
Article -
14
Development of a Mobile Robot Local Navigation System Based on Fuzzy-Logic Control and Actual Virtual Target Switching
Published 2006“…Under the control of the algorithm, the mobile robot makes logical trajectories toward the target, finds best ways out of dead ends, avoids any types of obstacles, and adjusts its speed efficiently for better obstacle avoidance and according to power considerations and actual limits. …”
Get full text
Get full text
Thesis -
15
Programming Approach in Teaching Operations Research Techniques for Computer Science Students
Published 2005“…Furthermore, in order to perform the analysis of the mathematical model, computer science students need to be introduced with the tools of mathematics, algorithm development, and computer programming approach for solving the problems. …”
Get full text
Get full text
Conference or Workshop Item -
16
Classification System for Heart Disease Using Bayesian Classifier
Published 2007“…This system was mainly developing using java programming. Apache Tom cat was used as a server in order to run the application smoothly. …”
Get full text
Get full text
Thesis -
17
-
18
-
19
Biometrics electronic purse
Published 1999“…This paper looked into using biometrics as a mean of authentication, thus requiring a new generation of Smart Card technology to be implemented in banking and multiple applications environment. …”
Get full text
Get full text
Get full text
Proceeding Paper -
20
Sentiment mining in twitter for early depression detection / Najihah Salsabila Ishak
Published 2021“…At the end of this project, a prototype that can classify tweet is developed and used to monitor the tweets' sentiment probability.…”
Get full text
Get full text
Thesis
