Search Results - (( development process writing algorithm ) OR ( java application modified algorithm ))

Refine Results
  1. 1

    Challenges of hidden data in the unused area two within executable files by Naji, Ahmed Wathik, Zaidan, A.A., Zaidan, B.B.

    Published 2009
    “…Conclusion: Features of the short-term responses were simulated that the size of the hidden data does depend on the size of the unused area2 within cover file which is equal 20% from the size of exe.file before hiding process, most antivirus systems do not allow direct write in executable file, so the approach of the proposed system is to prevent the hidden information to observation of these systems and the exe.file still function as usual after the hiding process. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Identifying Students' Summary Writing Strategies Using Summary Sentence Decomposition Algorithm by Idris, Norisma, Baba, Mohd Sapiyan, Abdullah, Rukaini

    Published 2011
    “…But virtually none have been developed to assess the process particularly in identifying the strategies used. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3
  4. 4

    Penilaian esei berbantukan komputer menggunakan teknik Bayesian dan pengunduran linear berganda by Mohamad @ Hamza, Mohd. Azwan

    Published 2006
    “…MMB Technique only required a small size of training data. (3) Prediction process of writing style using Multiple Linear Regression (MLR) Algorithm. …”
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…A GUI is created in a form of JAVA application to display data detected from tag. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Automatic generation of content security policy to mitigate cross site scripting by Mhana, Samer Attallah, Din, Jamilah, Atan, Rodziah

    Published 2016
    “…The algorithm is implemented as a plugin. It does not interfere with the web application original code. …”
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    Study on crack detection using image processing techniques and deep learning – a survey by Saleem, Muhammad Asif, Senan, Norhalina, Ahmad, Rehan

    Published 2020
    “…The purpose of this writing is to study and understand the existing crack detection techniques using image processing. …”
    Get full text
    Get full text
    Article
  9. 9

    Vision-based robot indoor navigation by Teo, Zhin Hang

    Published 2022
    “…NodeRed links both processing units together. An algorithm is developed in the computer to achieve image processing, user input, path planning, simulation, and writing of output files. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  10. 10

    Online teleoperation of writing manipulator through graphics processing unit based accelerated stereo vision by Abu Raid, Fadi Imad Osman

    Published 2021
    “…These benefits however are challenged by the high computational requirements of the algorithms used. In this thesis, a framework is developed to enable the use of stereo vision in realtime teleoperation of a manipulator robot for the task of writing. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Relevance detection and summarizing strategies identification algorithm using linguistic measures / Seyed Asadollah Abdiesfandani by Seyed Asadollah, Abdiesfandani

    Published 2016
    “…We then develop a new algorithm to address the summarizing strategies identification problem. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Detection on ambiguous software requirements specification written in malay using machine learning by Zahrin, Mohd Firdaus

    Published 2017
    “…Software requirement specification (SRS) document is the most crucial document in software development process. SRS is normally produced during the initial part of software development process and all subsequent steps in software development are influenced by the requirements. …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    Factors and types of error that contributes to the difficulties in solving Mathematical problems among Year 5 pupils in SK Goebilt, Kuching / Hardi Rasidi by Rasidi, Hardi

    Published 2016
    “…The results show that factors that contribute to difficulties in solving mathematical word problems are reading, understanding, transforming word problem, applying process skill and encoding. Meanwhile, for the types of algorithm errors are careless, computation error, wrong writing, wrong place value and others. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Developing computational thinking competencies through constructivist argumentation learning: a problem-solving perspective by Voon, Xin Pei, Wong, Su Luan, Wong, Lung Hsiang, Md Khambari, Mas Nida, Syed Abdullah, Sharifah Intan Sharina

    Published 2022
    “…To nurture higher order thinking skills and to engage effective problem-solvers, our framework incorporates four Computational Thinking-Argumentation design principles to support instructional innovation in the teaching and learning of science at the secondary school level, viz. 1) developing problem-solving competencies and building capability in solving uncertainties throughout scientific inquiry; 2) developing creative thinking and cooperativity through negotiation and evaluation; 3) developing algorithmic thinking in talking and writing; 4) developing critical thinking in the processes of abstraction and generalization.…”
    Get full text
    Get full text
    Article
  15. 15

    An analysis of the AAḃ asymmetric encryption scheme on embedded devices for IoT environment / Syed Farid Syed Adnan by Syed Adnan, Syed Farid

    Published 2019
    “…One such lightweight scheme is the AA-Beta (AAḃ) asymmetric cryptographic scheme whose algorithm consists of only basic arithmetic operations of addition and subtraction for both the encryption and decryption processes. …”
    Get full text
    Get full text
    Thesis
  16. 16

    GPU accelerated stereo vision system to capture handwriting information by Fadi Imad, Syed Ahmad, Sharifah Mumtazah, Hashim, Shaiful Jahari, Samsudin, Khairulmizam

    Published 2019
    “…This is done by porting and optimizing essential processing algorithms to operate efficiently in parallel on a GPU. …”
    Get full text
    Get full text
    Article
  17. 17

    Jawi recognition system by Nur Aziela, Mansor

    Published 2010
    “…This Jawi Character recognition system begins with image processing and then the output image is trained using backpropagation algorithm. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  18. 18
  19. 19

    Postal address handwritten recognition using convolutional neural network / Nur Hasyimah Abd Aziz by Abd Aziz, Nur Hasyimah

    Published 2020
    “…While shifting to digital writing stylus gives more detail, such as pen movement, pressure and writing speed, there is still a need for offline methods when it is unavailable online. …”
    Get full text
    Get full text
    Thesis
  20. 20

    A Malay Chatterbot by Lokman, Aina Fatiha

    Published 2005
    “…Theymake use of various techniques such as pattern matching, indexing, sentence reconstruction, and even natural language processing. In this paper, the author presents an approach to develop a chatterbot, A Malay-Intelligence Response Application (A.M.I.R.A) that will be able to communicate or converse in Bahasa Melayu. …”
    Get full text
    Get full text
    Final Year Project