Search Results - (( developing virtualization matching algorithm ) OR ( java application modified algorithm ))

  • Showing 1 - 14 results of 14
Refine Results
  1. 1

    Finger triggered virtual musical instruments by Ng, Chee Kyun, Ee, Gee Keng, Noordin, Nor Kamariah, Fam, Jiang Gi

    Published 2013
    “…The musical notes recognition system matches the received triggering signal data with the predefined musical notes data using matching algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Finger triggered virtual musical instruments by Ng, Chee Kyun, Fam, Jiang Gi, Noordin, Nor Kamariah

    Published 2012
    “…The musical notes recognition system matches the received triggering signal data with the predefined musical notes data using matching algorithm. …”
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3
  4. 4
  5. 5

    Chatbot development in data representation for diabetes education by Abbas Saliimi, Lokman

    Published 2011
    “…E-CARE contains two respective applications, 1) E-CARE multimedia content, and 2) SQL-based chatbot named ViDi (acronyms for Virtual Diabetes physician). Alongside the development of ViDi chatbot, several new approaches (algorithms and techniques) had been proposed. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Identifying Students' Summary Writing Strategies Using Summary Sentence Decomposition Algorithm by Idris, Norisma, Baba, Mohd Sapiyan, Abdullah, Rukaini

    Published 2011
    “…In comparison to human performance, the algorithm's performance closely matched that of human with 94 accuracy in identifying the syntax level strategies. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…A GUI is created in a form of JAVA application to display data detected from tag. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Automatic generation of content security policy to mitigate cross site scripting by Mhana, Samer Attallah, Din, Jamilah, Atan, Rodziah

    Published 2016
    “…The algorithm is implemented as a plugin. It does not interfere with the web application original code. …”
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9
  10. 10
  11. 11
  12. 12

    Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system by Beg, Abul Hashem

    Published 2011
    “…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14

    Computed tomography and echocardiography image fusion technique for cardiac images by Kalahroodi, Samaneh Mazaheri

    Published 2016
    “…Then, a segmentation approach based on a constrained Level set method is developed to identify the feature from Echocardiography images. …”
    Get full text
    Get full text
    Get full text
    Thesis