Search Results - (( developing theme based algorithm ) OR ( java application during algorithm ))
Search alternatives:
- application during »
- developing theme »
- java application »
- during algorithm »
- theme based »
-
1
SUDOKU HELPER
Published 2015“…In this paper research, author presents an algorithm to provide a tutorial for any Sudoku player who got stuck during the solving process. …”
Get full text
Get full text
Final Year Project -
2
Evaluating the usability of a Quranic theme extraction and visualization system using task-based usability testing
Published 2025“…This study presents a task-based usability evaluation of a Quranic Theme Extraction and Visualization System, which integrates Natural Language Processing (NLP) techniques which are RAKE algorithm for keyword extraction and DistilBERT for theme classification. …”
Get full text
Get full text
Get full text
Article -
3
Talkout : Protecting mental health application with a lightweight message encryption
Published 2022“…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
Get full text
Get full text
Get full text
Academic Exercise -
4
Form four chemistry teachers’ conceptualization of pedagogical content knowledge / Chien Lee Shing
Published 2016“…Coding was done on the data to form sub themes which were later collapsed into themes. The coding of the data was guided by the research questions and new themes were allowed to emerge from the data. …”
Get full text
Get full text
Thesis -
5
A conceptual framework for multi-objective optimization of building performance: Integrating intelligent algorithms, simulation tools, and climate adaptation
Published 2025“…A thematic analysis of 40 peer-reviewed articles was conducted using ATLAS.ti, revealing three dominant research themes: intelligent algorithms, building performance simulation techniques, and adaptive design for climate change. …”
Get full text
Get full text
Get full text
Article -
6
-
7
-
8
The exploration of hybrid metaheuristics-based approaches: A bibliometric analysis
Published 2025“…Employing an analysis of publications, this study maps the historical development, key terms and the most dominant works in this field. …”
Get full text
Get full text
Get full text
Article -
9
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis -
10
Computational Thinking Through Unplugged Programming Activities : Exploring Students’ Learning Experiences
Published 2019“…Based on their pre-test and post-test results, nine of them were selected for individual interview. …”
Get full text
Get full text
Thesis -
11
An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications
Published 2015“…This research work was limited to Java based web applications. In future research, the method can be extended to include other programming languages as well as other similar web application security vulnerabilities.…”
Get full text
Get full text
Thesis -
12
Artificial intelligence (AI) and its application in architecture design: a thematic review
Published 2025“…The analysis identified six primary themes: 1) Architecture and Science, which includes research on complex systems, genetic algorithms, and machine learning;2) Architecture and Construction Management, including the development of frameworks that support decision making; architecture and interior design, which includes work on space-planning optimization and furniture and occupant arrangement;3) Architecture Interior Design; 4) Architecture and Urban; which encompasses attempts to develop tools to help design new cities; architectural engineering, where building performance analysis was the most-common AI application; 5) Architectural Engineering; and 6) Design Education and Training, in which AI appears most promising for advancing problem-based learning. …”
Get full text
Get full text
Get full text
Article -
13
A qualitative study of families of Edwards Curves and their applications in cryptography / Nurul Azwa Kamaruddin and Nurul Ain Mustakim
Published 2012“…Among those cryptosystems, there are three types of public key cryptographic systems that are currently considered both secure and efficient, classified according to the mathematical problems upon which they are based: the Integer Factorization Systems (of which the RSA algorithm is the most well known example), the Discrete logarithm Systems (such as the US Government’s Digital Signature Algorithm) and the Elliptic Curve Cryptosystem (ECC). …”
Get full text
Get full text
Research Reports -
14
In silico prediction and validation of Gfap as miR-3099 target in the mouse brain
Published 2017“…Those predicted by at least three algorithms (324 genes) were subjected to DAVID bioinformatics analysis to understand their overall functional themes and representation. …”
Get full text
Get full text
Get full text
Article -
15
Human activity recognition via accelerometer and gyro sensors
Published 2023“…To implement the data engineering system proposed, two mobile applications, SensorData and SensorDataLogger with user-friendly interfaces and intuitive functionalities are developed using Java programming language and Android Studio. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
16
Classification for Quran authentication using characters and diacritics hashed values
Published 2024journal::journal article -
17
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. Ultimately, the algorithm development program designed earlier is linked up directly to the robotic model for program implementation and verification. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
18
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis -
19
A hybrid of fuzzy c-means clustering and Latent Dirichlet Allocation for analysing philanthropic corporate social responsibility activities / Nik Siti Madihah Nik Mangsor
Published 2023“…Therefore, this research aims to develop hybrid fuzzy document clustering techniques to improve attribute cluster membership values of PCSR activities. …”
Get full text
Get full text
Thesis -
20
Identification of Quran recitation segment from speech video recording / Liliana Nulkasim @ Mohd Kassim
Published 2017“…Identifying Quran recitation segment from speech video recording has become one of an active research themes in speech processing and in application based on Quran education. …”
Get full text
Get full text
Thesis
