Search Results - (( developing theme a algorithm ) OR ( java application customization algorithm ))

Refine Results
  1. 1

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Computational Thinking (Algorithms) Through Unplugged Programming Activities: Exploring Upper Primary Students’ Learning Experiences by Bih Loong, Lim, Chwen Jen, Chen

    Published 2021
    “…This study may serve as a reference in establishing a comprehensive UPA module for teaching algorithms aspect of CT skills.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Evaluating the usability of a Quranic theme extraction and visualization system using task-based usability testing by Azuan, Alya Maisarah

    Published 2025
    “…Usability testing is crucial for evaluating the effectiveness and user experience of information retrieval systems. This study presents a task-based usability evaluation of a Quranic Theme Extraction and Visualization System, which integrates Natural Language Processing (NLP) techniques which are RAKE algorithm for keyword extraction and DistilBERT for theme classification. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4
  5. 5

    Form four chemistry teachers’ conceptualization of pedagogical content knowledge / Chien Lee Shing by Chien, Lee Shing

    Published 2016
    “…A framework of collaboration was iii proposed to help the chemistry teachers develop and expand their PCK evenly and holistically. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Design & Development of a Robotic System Using LEGO Mindstorm by Abd Manap, Nurulfajar, Md Salim, Sani Irwan, Haron, Nor Zaidi

    Published 2006
    “…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    A conceptual framework for multi-objective optimization of building performance: Integrating intelligent algorithms, simulation tools, and climate adaptation by Rong, Li, Shari, Zalina, Ab Kadir, Mohd Zainal Abidin

    Published 2025
    “…A thematic analysis of 40 peer-reviewed articles was conducted using ATLAS.ti, revealing three dominant research themes: intelligent algorithms, building performance simulation techniques, and adaptive design for climate change. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8
  9. 9

    A qualitative study of families of Edwards Curves and their applications in cryptography / Nurul Azwa Kamaruddin and Nurul Ain Mustakim by Kamaruddin, Nurul Azwa, Mustakim, Nurul Ain

    Published 2012
    “…There are many types of scheme used in encrypting a message so that it can be sent to a particular receiver from a particular sender without the third party knowing the content of the message known as cryptosystem. …”
    Get full text
    Get full text
    Research Reports
  10. 10
  11. 11

    Artificial intelligence (AI) and its application in architecture design: a thematic review by Jin, Deran, Zairul, Mohd, Salih, Sarah Abdulkareem

    Published 2025
    “…The research indicates a growing emphasis on AI in architecture, aiming to improve algorithms, integrate with diverse tools like BIM, and enhance efficiency in design and engineering management to promote building sustainability. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    In silico prediction and validation of Gfap as miR-3099 target in the mouse brain by Zainal Abidin, Shahidee, Leong, Jia Wen, Mahmoudi, Marzieh, Nordin, Norshariza, Abdullah, Syahrilnizam, Cheah, Pike See, Ling, King Hwa

    Published 2017
    “…Moreover, miR-3099 is also expressed at a higher level in differentiating neurons in vitro, suggesting that it is a potential regulator during neuronal cell development. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Secured electrocardiograph (ECG) signal using fully homomorphic encryption technique by Shaikh, Muhammad Umair, Ahmad, Siti Anom, Wan Adnan, Wan Azizun

    Published 2020
    “…The proposed encryption scheme FHE is performed on the encrypted ECG data where FHE can be applied in any system by using a various public key algorithm. The secured ECG transmission system will work on the fourth industrial revolution with four major themes: speed of care, ability to manage illness, the role of patient and the relationship between healthcare and service provider. …”
    Get full text
    Get full text
    Article
  14. 14
  15. 15

    The exploration of hybrid metaheuristics-based approaches: A bibliometric analysis by Nur Hidayah, Azmidi, Noryanti, Muhammad, Rozieana, Khairuddin

    Published 2025
    “…The study findings indicate a growing and broader trend towards the integration of metaheuristics and optimization algorithms, echoing the interdisciplinary nature of this domain. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Computational Thinking Through Unplugged Programming Activities : Exploring Students’ Learning Experiences by Lim, Bih Loong

    Published 2019
    “…The aim of this research study is to explore the experience of primary school students’ on learning algorithm (one of the CT skills) through UPA. A total of thirty-one participants took the pre-test, followed by exposure to the UPA learning material and post-test in this study. …”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    A hybrid of fuzzy c-means clustering and Latent Dirichlet Allocation for analysing philanthropic corporate social responsibility activities / Nik Siti Madihah Nik Mangsor by Nik Mangsor, Nik Siti Madihah

    Published 2023
    “…Conventional clustering algorithms are able to extract only a single set of flat topics in which local and global topics are mingled and cannot be separated. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Identification of Quran recitation segment from speech video recording / Liliana Nulkasim @ Mohd Kassim by Nulkasim @ Mohd Kassim, Liliana

    Published 2017
    “…This project develops a system to identify Quran recitation segment from speech video recording. …”
    Get full text
    Get full text
    Thesis
  19. 19

    The design for antrophomorphic sociable agent interaction through emotion detection by Ab. Aziz, Azizi, Siraj, Fadzilah, Sainin, Mohd Shamrie, Mohd Hassin, Mohd Hafiz

    Published 2003
    “…This research works addresses on faces features through simulation of anthropomorphic agent.A salience feature of this definition of emotion is described in terms of goals and roles.Therefore, it provides a basic framework of goal-driven processing, which is to investigate computational models of emotion.The main goal of this research is to provide a natural interaction scheme where the affective interaction emotive state of the user can be identified.One aspect of developing such a capability is the ability of the system to recognize emotional state using intelligent supervised learning algorithms, personality of the user and respond appropriately.An anthropomorphic agent will serve to express the reaction through affective feedback given. …”
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20