Search Results - (( developing theme using algorithm ) OR ( java application matching algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5

    Securing cloud data system (SCDS) for key exposure using AES algorithm by Thabet Albatol, Mohammed Samer Hasan

    Published 2021
    “…The AES algorithm has its own structure to encrypt and decrypt sensitive data that make the attackers difficult to get the real data when encrypting by AES algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Computational Thinking (Algorithms) Through Unplugged Programming Activities: Exploring Upper Primary Students’ Learning Experiences by Bih Loong, Lim, Chwen Jen, Chen

    Published 2021
    “…From the responses gathered through interviewing nine of these participants, four main themes (Good Learning Quality, Much Knowledge, Easy and Useful) related to their learning experiences have been derived. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Evaluating the usability of a Quranic theme extraction and visualization system using task-based usability testing by Azuan, Alya Maisarah

    Published 2025
    “…This study presents a task-based usability evaluation of a Quranic Theme Extraction and Visualization System, which integrates Natural Language Processing (NLP) techniques which are RAKE algorithm for keyword extraction and DistilBERT for theme classification. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8
  9. 9
  10. 10

    Form four chemistry teachers’ conceptualization of pedagogical content knowledge / Chien Lee Shing by Chien, Lee Shing

    Published 2016
    “…Coding was done on the data to form sub themes which were later collapsed into themes. The coding of the data was guided by the research questions and new themes were allowed to emerge from the data. …”
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12
  13. 13

    Secured electrocardiograph (ECG) signal using fully homomorphic encryption technique by Shaikh, Muhammad Umair, Ahmad, Siti Anom, Wan Adnan, Wan Azizun

    Published 2020
    “…The proposed encryption scheme FHE is performed on the encrypted ECG data where FHE can be applied in any system by using a various public key algorithm. The secured ECG transmission system will work on the fourth industrial revolution with four major themes: speed of care, ability to manage illness, the role of patient and the relationship between healthcare and service provider. …”
    Get full text
    Get full text
    Article
  14. 14

    Computational Thinking Through Unplugged Programming Activities : Exploring Students’ Learning Experiences by Lim, Bih Loong

    Published 2019
    “…From the responses gathered through the interview sessions, four theme which are Good Learning Quality, Much Knowledge, Easy and Useful have been derived.…”
    Get full text
    Get full text
    Thesis
  15. 15

    A qualitative study of families of Edwards Curves and their applications in cryptography / Nurul Azwa Kamaruddin and Nurul Ain Mustakim by Kamaruddin, Nurul Azwa, Mustakim, Nurul Ain

    Published 2012
    “…The purpose of the qualitative study is to explore and develop basic understanding of the properties of the families of Edwards curves, one of the special forms of elliptic curves, and their applications in cryptography, using grounded theory approach, in which the data are hand-analyzed, coded and grouped into themes under study. …”
    Get full text
    Get full text
    Research Reports
  16. 16

    A conceptual framework for multi-objective optimization of building performance: Integrating intelligent algorithms, simulation tools, and climate adaptation by Rong, Li, Shari, Zalina, Ab Kadir, Mohd Zainal Abidin

    Published 2025
    “…A thematic analysis of 40 peer-reviewed articles was conducted using ATLAS.ti, revealing three dominant research themes: intelligent algorithms, building performance simulation techniques, and adaptive design for climate change. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17
  18. 18

    In silico prediction and validation of Gfap as miR-3099 target in the mouse brain by Zainal Abidin, Shahidee, Leong, Jia Wen, Mahmoudi, Marzieh, Nordin, Norshariza, Abdullah, Syahrilnizam, Cheah, Pike See, Ling, King Hwa

    Published 2017
    “…Moreover, miR-3099 is also expressed at a higher level in differentiating neurons in vitro, suggesting that it is a potential regulator during neuronal cell development. This study aimed to predict the target genes of miR-3099 via in-silico analysis using four independent prediction algorithms (miRDB, miRanda, TargetScan, and DIANA-micro-T-CDS) with emphasis on target genes related to brain development and function. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Artificial intelligence (AI) and its application in architecture design: a thematic review by Jin, Deran, Zairul, Mohd, Salih, Sarah Abdulkareem

    Published 2025
    “…The use of ATLAS. ti 23 aided in documenting and indicating the research directions pursued by scholars. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    The exploration of hybrid metaheuristics-based approaches: A bibliometric analysis by Nur Hidayah, Azmidi, Noryanti, Muhammad, Rozieana, Khairuddin

    Published 2025
    “…Utilizing the R Studio with Bibliometrix package and Shiny UI, the bibliometric study uncovered the thematic structure of the research area using co-occurrence network, revealed the intercorrelation concepts, represented the central themes and the evolution of research focus over 5 years through word clouds, Sankey diagram and others. …”
    Get full text
    Get full text
    Get full text
    Article