Search Results - (( development course visualization algorithm ) OR ( java power function algorithm ))

  • Showing 1 - 16 results of 16
Refine Results
  1. 1
  2. 2

    Algorithm-program visualization model : An intergrated software visualzation to support novices' programming comprehension by Affandy

    Published 2015
    “…This model is then to be used in the prototype tool development that is called 3De-ALPROV (Design Development Debug – Algorithm Program Visualization). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    Using Electromagnetism-like algorithm and genetic algorithm to optimize time of task scheduling for dual manipulators by Abed I.A., Sahari K.S.M., Koh S.P., Tiong S.K., Jagadeesh P.

    Published 2023
    “…The movement and the configurations of the manipulators at the task points were visualized using a simulator developed via Visual Basic. …”
    Conference paper
  4. 4

    Grid portal technology for web based education of parallel computing courses, applications and researches by Alias, Norma, Islam, Md. Rajibul, Mydin, Suhaimi, Hamzah, Norhafiza, Safiza Abd. Ghaffar, Zarith, Satam, Noriza, Darwis, Roziha

    Published 2009
    “…These courses will actively engage the students in exploring the concepts of the development the parallel algorithm in visualizing the grand challenge applications of mathematical problems. …”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    SANAsms: Secure short messaging system for secure GSM mobile communication by Anuar, N.B., Azlan, I.M., Wahid, A.W.A., Zakaria, O.

    Published 2008
    “…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Network monopoly / Tan Kean Yeap by Tan , Kean Yeap

    Published 2002
    “…With the powerful networking features of Java, it is expected that this project would produce a "real" game engine. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Fingerprint recognition using neural networks / Kennie Yeoh Eng Hoe by Kennie Yeoh , Eng Hoe

    Published 2001
    “…Alternatively, patch-matching algorithm was developed in success of the Fourier Transform method when results -were not favorable to it. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Agro-ento bioinformation: towards the edge of reality by Syed Hassan, Syed Tajuddin

    Published 2002
    “…The primers, which entrain processes, both natural and man-induced, include mechanisms such as protocols, algorithms, visualisations, and structural and visual designs. …”
    Get full text
    Get full text
    Inaugural Lecture
  10. 10

    Jobs Visualization and Salary Prediction System Based on Jobstreet Malaysia / Khyrina Airin Fariza Abu Samah ... [et al.] by Abu Samah, Khyrina Airin Fariza, Wirakarnain, Nurqueen Sayang Dinnie, Deraman, Noor Afni, Johari, Siti Nor Amalina, Moketar, Nor Aıza, Hasrol Jono, Mohd Nor Hajar

    Published 2021
    “…The extracted Jobstreet’s data runs the pre-processing, develops the model, and runs on real-world data. Linear Regression algorithm was used to predict the salary and tested using mean absolute error to validate the prediction. …”
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    Optimization of the Time of Task Scheduling for Dual Manipulators using a Modified Electromagnetism-Like Algorithm and Genetic Algorithm by Abed I.A., Koh S.P., Sahari K.S.M., Jagadeesh P., Tiong S.K.

    Published 2023
    “…A method based on a modified electromagnetism-like with two-direction local search algorithm (MEMTDLS) and genetic algorithm (GA) is proposed to determine the optimal time of task scheduling for dual-robot manipulators. …”
    Article
  12. 12

    Tacit knowledge for business intelligence framework using cognitive-based approach by Surbakti, Herison

    Published 2022
    “…The framework was tested on 23 librarians from several university libraries in West Java and Yogyakarta, Indonesia. The algorithm starts with a content targeted interview to identify the list of problems faced by librarians. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Fuzzy-based multi-agent approach for reliability assessment and improvement of power system protection by Nadheer Abdulridha, Shalash

    Published 2015
    “…The simulation results show the effectiveness of proposed MAS approaches for selecting the best DG location in a function of improved power system grounding and reliability. …”
    Get full text
    Get full text
    Thesis
  14. 14

    An early warning system for students at risk using supervised machine learning by Yam, Zheng Hong, Mohd Norshahriel, Abd Rani, Nabilah Filzah, Mohd Radzuan, Lim, Huay Yen, Sarasvathi, Nagalingam

    Published 2024
    “…According to the research, 52% of students who sign up for a course would never read the course materials. Furthermore, throughout the course of five years, the dropout rate reached a stunning 96%. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    DurianCare: optimising trunk disease detection and precision farming in a mobile application / Muhammad Haziq Azmi by Azmi, Muhammad Haziq

    Published 2025
    “…This could include for instance a systematic literature review on theories available to understand the current problem and its possible solution, analysis of the users need gathered from interviews, and of course the application development using Flutter within Visual Studio Code. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Evaluation of cracks and disintegrations using close-range digital photogrammetry and image processing technique by Ling, Tung Chai

    Published 2005
    “…Results obtained by this technique are compared with the Jabatan Kerja Raya manual using conventional method to check accuracy. The algorithms developed in this study are capable of identifying type of cracking and its severity level at the accuracy about 90%. …”
    Get full text
    Get full text
    Thesis