Search Results - (( developing rational method algorithm ) OR ( java applications out algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3

    Rational methods for solving first order ordinary differential equation by Fairuz, A'in Nazifa

    Published 2019
    “…On the other hand, the methods from the second class are all A-stable. Besides that, the algorithm for the proposed methods are developed with constant step size strategy, in which the strategy to compute the starting values by an existing methods is also included. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Real-Time Video Processing Using Native Programming on Android Platform by Saipullah, Khairul Muzzammil

    Published 2012
    “…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Designing of skull defect implants using C1 rational cubic Bezier and offset curves by Najihah, Mohamed, Ahmad, Abd Majid, Abd Rahni, Mt Piah, Zainul, Ahmad Rajion

    Published 2015
    “…The main objective of our study is to develop a simple method to redesign missing parts of the skull. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6
  7. 7
  8. 8
  9. 9

    A web-based implementation of k-means algorithms by Lee, Quan

    Published 2022
    “…The project was planned using the Kanban development methodology, and was built using HTML, CSS, JavaScript, Django, NumPy and pandas. The completed web application is then hosted on Heroku. k-luster allows users to upload their own data set, or choose from one of three samples if they just want to try out the application. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  10. 10

    Smart appointment organizer for mobile application / Mohd Syafiq Adam by Adam, Mohd Syafiq

    Published 2009
    “…In creating this application, NetBeans IDE 6.5and Java Micro Edition (Java ME) are used. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Ranking trapezoidal fuzzy numbers based on set theoretic indices with Hurwicz criterion / Nazirah Ramli by Ramli, Nazirah

    Published 2003
    “…This study investigates on the development of the NRI and based on that, two observations and three algorithms are created. …”
    Get full text
    Get full text
    Book Section
  12. 12

    Talkout : Protecting mental health application with a lightweight message encryption by Gavin Teo Juen

    Published 2022
    “…However, the increased security breaches of recent mental health applications that leaked the patient's profile. This project proposed a virtual mental health mobile application, called TalkOut, with a lightweight message encryption algorithm to protect patient's profile, conversation messages and treatment history. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  13. 13

    Multi-base number representation in application to scalar multiplication and pairing computation by Mohammed Ismail, Abdelwahed

    Published 2011
    “…Miller’s algorithm for computing the Tate pairing, originally used the binary chains with corresponding point doubling operation in evaluating the rational function. …”
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15

    Composite slab numerical strength test method under partial connection approach by Mohammed, Kachalla, Abd. Karim, Izian, Abd. Aziz, Farah Nora Aznieta

    Published 2017
    “…Hence, a procedural algorithm lead to the development of PCS determination function using longitudinal shear estimation method by considering section slenderness and deck characteristics. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    Inversion algorithm of fiber bragg grating for nanofluid flooding monitoring by Yahya, N., Nyuk, C.M., Ismail, A.F., Hussain, N., Rostami, A., Ismail, A., Ganeson, M., Ali, A.M.

    Published 2020
    “…This technique is a promising method in rational magnetophoresis toward fluid mobility via fiber Bragg grating (FBG). …”
    Get full text
    Get full text
    Article
  17. 17

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Signatory however use a special Digital Signature Application which store the secret private key. The application was programmed by JAVA FX. …”
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19

    New Sequential and Parallel Division Free Methods for Determinant of Matrices by Sharmila, Karim

    Published 2013
    “…The computation times in the newly developed sequential methods were dominated by generating starter sets. …”
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    Depth linear discrimination-oriented feature selection method based on adaptive sine cosine algorithm for software defect prediction by Nasser, Abdullah, H.M. Ghanem, Waheed Ali, H.Y. Saad, Abdul-Malik, Hamed Abdul-Qawy, Antar Shaddad, A. Ghaleb, Sanaa A, Mohammed Alduais, Nayef Abdulwahab, Din, Fakhrud, Ghetas, Mohamed

    Published 2024
    “…DASC-FS integrates the Adaptive Sine Cosine Algorithm (ASCA) as a search algorithm to determine the relevant features and adopts Depth Linear Discriminant Analysis (D-LDA) to identify the discriminative features that maximize class sepa ration. …”
    Get full text
    Get full text
    Get full text
    Article