Search Results - (( developing reflection through algorithm ) OR ( java application during algorithm ))

Refine Results
  1. 1

    Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system by Beg, Abul Hashem

    Published 2011
    “…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
    Get full text
    Get full text
    Thesis
  2. 2

    SUDOKU HELPER by Abdul Razak, Muhammad Asyraf

    Published 2015
    “…In this paper research, author presents an algorithm to provide a tutorial for any Sudoku player who got stuck during the solving process. …”
    Get full text
    Get full text
    Final Year Project
  3. 3

    Analysis of hyperspectral reflectance for disease classification of soybean frogeye leaf spot using Knime analytics by Ang, Yuhao, Mohd Shafri, Helmi Zulhaidi

    Published 2023
    “…All of these steps were carried out through KNIME analytical platform. Based on the results of the analysis, GA-stacking and random forest algorithms achieved the best overall accuracy of 85.9 and 84.3, respectively. …”
    Get full text
    Get full text
    Article
  4. 4
  5. 5

    Talkout : Protecting mental health application with a lightweight message encryption by Gavin Teo Juen

    Published 2022
    “…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  6. 6

    Heart-design nexus: the emotion algorithm by Mohd Lokman, Anitawati

    Published 2025
    “…The subtitle, "The Emotion Algorithm", reflects the systematic, methodical approach that transforms fleeting feelings into tangible design parameters. …”
    Get full text
    Get full text
    Book
  7. 7
  8. 8

    Defect detection of GFRP composites through long pulse thermography using an uncooled microbolometer infrared camera by Anwar, Murniwati, Mustapha, Faizal, Abdullah, Mohd Na’im, Mustapha, Mazli, Sallih, Nabihah, Ahmad, Azlan, Mat Daud, Siti Zubaidah

    Published 2024
    “…The detection of impact and depth defects in Glass Fiber Reinforced Polymer (GFRP) composites has been extensively studied to develop effective, reliable, and cost-efficient assessment methods through various Non-Destructive Testing (NDT) techniques. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9
  10. 10

    Modified word representation vector based scalar weight for contextual text classification by Abbas Saliimi, Lokman

    Published 2024
    “…To validate this algorithm, the modified word vectors are compared with original LLM-generated word vectors to evaluate their reflection of the intended context. …”
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12

    A hybrid approach for personalized news recommendation with ordered clustering algorithm, rich user and news metadata by Darvishy, Asghar

    Published 2019
    “…We have proposed a clustering algorithm named Ordered Clustering with a specific characteristic that allows multiple membership in clusters which reflects the news nature and user behavior. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Surface Reflectance And Discriminant Analysis For Mapping Of Mangrove Species In Kuala Sepetang Mangrove Forest Reserve, Perak by Beh, Boon Chun

    Published 2016
    “…The first method is to develop an algorithm that was based on species’ surface reflectance to map the mangrove species by using high-resolution CropCam Unmanned Aerial Vehicle (UAV) data. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Uninterruptible power supply topology using single phase matrix converter with active power filter functionality / Muhammad Shawwal Mohamad Rawi by Mohamad Rawi, Muhammad Shawwal

    Published 2022
    “…The distorted supply current waveform due to the non-linear load is compensated through a proper switching algorithm of SPMC to function as an Active Power Filter (APF). …”
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16

    A malware analysis and detection system for mobile devices / Ali Feizollah by Ali, Feizollah

    Published 2017
    “…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    Intent-IQ: customer’s reviews intent recognition using random forest algorithm by Mazlan, Nur Farahnisrin, Ibrahim Teo, Noor Hasimah

    Published 2025
    “…Two machine learning model is chosen to build the classification models which are Random Forest (RF) algorithm and Multinomial Naïve Bayes (MNB) algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Penilaian esei berbantukan komputer menggunakan teknik Bayesian dan pengunduran linear berganda by Mohamad @ Hamza, Mohd. Azwan

    Published 2006
    “…This study emphasized on optimization of prediction on discourse elements and writing style that leading to the development of CbAS through four phases of research methodology. (1) Pre-processing and data extraction phase where essay will be parsed into word (token) and implemented Word Correction Algorithm to re-correct the misspell word. (2) Training process of determination and classification of discourse elements using Multivariate Bernoulli Model (MMB) Technique. …”
    Get full text
    Get full text
    Thesis
  19. 19

    An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications by Hydara, Isatou

    Published 2015
    “…This research work was limited to Java based web applications. In future research, the method can be extended to include other programming languages as well as other similar web application security vulnerabilities.…”
    Get full text
    Get full text
    Thesis
  20. 20

    A hybrid constraint-based programming approach to design a sports tournament scheduling by Soong, Chai Juan, Ramli, Razamin, Ibrahim, Haslinda

    Published 2011
    “…Thus, this sophisticated algorithm provides the feasible, optimum, efficient and quick solution.…”
    Get full text
    Get full text
    Get full text
    Article