Search Results - (( developing students called algorithm ) OR ( java application customization algorithm ))

Refine Results
  1. 1
  2. 2

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4
  5. 5
  6. 6

    Optimization technique with sensitivity analysis on menu scheduling for boarding school student aged 13-18 using “Sufahani-Ismail Algorithm” by M. Sudin,, Azila, Sufahani, Suliadi

    Published 2018
    “…Boarding school student aged 13-18 need to eat nutritious meals which contains proper calories, vitality and nutrients for appropriate development with a specific end goal to repair and upkeep the body tissues. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    Algorithm-program visualization model : An intergrated software visualzation to support novices' programming comprehension by Affandy

    Published 2015
    “…This model is then to be used in the prototype tool development that is called 3De-ALPROV (Design Development Debug – Algorithm Program Visualization). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    Experimental Model for Teaching Software Testing by Kamal Z., Zamli, Hasneeza, L. Zakaria

    Published 2015
    “…In this paper, we propose the concept of teaching software testing with an experimental model for pairwise testing; developed with Migrating Birds Optimization (MBO) algorithm called Experimental Model for Teaching Software Testing (EMTST). …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9
  10. 10
  11. 11

    Talkout : Protecting mental health application with a lightweight message encryption by Gavin Teo Juen

    Published 2022
    “…This project proposed a virtual mental health mobile application, called TalkOut, with a lightweight message encryption algorithm to protect patient's profile, conversation messages and treatment history. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  12. 12

    Examination timetable scheduling system (ETSS) / Fong Teng Heng by Fong, Teng Heng

    Published 2000
    “…This documentation IS about the development of Examination Timetable Scheduling System or can be called ETSS. …”
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14
  15. 15

    Enhancing programming language learning with 3D game-based programming for MSU students: codadventure / Abdullah Adib Aditia Wirawan and Nur Suhana Mohd Redzo by Aditia Wirawan, Abdullah Adib, Mohd Redzo, Nur Suhana

    Published 2024
    “…This study focuses on innovative approaches to enhance the learning experiences of programming languages, focusing on developing 3D game-based programming for students at Management & Science University (MSU). …”
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16
  17. 17
  18. 18

    Predicting students’ STEM academic performance in Malaysian secondary schools using educational data mining by Termedi @ Termiji, Mohammad Izzuan

    Published 2023
    “…Data mining has been widely applied in educational area recently and it is commonly called Educational Data Mining (EDM). Via data and success analysis, schools may recognize and improve learning plans for students who fail to fulfil their needs. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Design & Development of a Robotic System Using LEGO Mindstorm by Abd Manap, Nurulfajar, Md Salim, Sani Irwan, Haron, Nor Zaidi

    Published 2006
    “…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20

    Real-time face recognition system in smart classroom using Haar cascade and local binary pattern model by Mohamed, Raihani, Jafni, Jaffrina Umaira, Mohd Rum, Siti Nurulain

    Published 2022
    “…Besides, taking students’ attendance manually such as calling out names and passing out papers to be signed is time-consuming. …”
    Get full text
    Get full text
    Conference or Workshop Item