Search Results - (( development programme visualization algorithm ) OR ( java execution between algorithm ))

  • Showing 1 - 14 results of 14
Refine Results
  1. 1

    Batch mode heuristic approaches for efficient task scheduling in grid computing system by Maipan-Uku, Jamilu Yahaya

    Published 2016
    “…In ELB algorithm, the tasks are distributed among resources based on their execution time range. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    Implementation of locust inspired scheduling algorithm with huge number of servers for energy efficiency in a cloud datacenter by Azhar, Nur Huwaina

    Published 2019
    “…Cloudsim is used as Discrete Event Simulation tool and Java as coding language to evaluate LACE algorithm. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Parallel computation of maass cusp forms using mathematica by Chan, Kar Tim

    Published 2013
    “…Our parallel programme comprises of two important parts namely the pullback algorithm and also the Maass cusp form algorithm. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Development of a steady state visual evoked potential (SSVEP)-based brain computer interface (BCI) system by Leow, R.S., Ibrahim, F., Moghavvemi, M.

    Published 2007
    “…The system includes a programmable visual stimulator, EEG amplifier with filter system, data acquisition card, and signal processing and classification algorithms. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography by Naji, Ahmed Wathik, Zaidan, B.B., Hameed, Shihab A., O-Khalifa, Othman

    Published 2009
    “…The system includes two main functions; first is the hiding of the information in unused area 2 of PE-file (.EXE file), through the execution of four process (specify the cover file, specify the information file, encryption of the information, and hiding the information) and the second function is the extraction of the hiding information through three process (specify the steno file, extract the information, and decryption of the information) and The proposed system is implemented by using java.…”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Design and implementation of multimedia digital matrix system by Chui, Yew Leong, Ramli, Abdul Rahman, Perumal, Thinagaran, Sulaiman, Mohd Yusof, Ali, Mohd Liakot

    Published 2005
    “…Due to the issues of signal integrity in high-speed digital design, a new adaptive channel synchronization algorithm has been developed. The algorithm, named as hybrid-reset algorithm utilizes the nature of asynchronous reset to compensate the drawback of synchronous counter for phase detection. …”
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    Flowshop scheduling using artificial bee colony (ABC) algorithm with varying onlooker bees approaches by Mohd Pauzi, Nur Fazlinda

    Published 2015
    “…A simulation computer program was developed using Visual Basic Editor in Microsoft excel 2007. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    An efficient low-cost real-time brain computer interface system based on SSVEP by Leow, R.S., Moghavvemi, M., Ibrahim, F.

    Published 2010
    “…The system includes a frequency-programmable visual stimulator, EEG-band amplifier and filter, 16-bit data acquisition card, and signal processing and classification algorithms. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    An enhancement of multi-factor weighted approach technique in prioritizing test cases by comparing similarity distance by Al-Shaibani, Alaa Alrhman Mohammed Raweh, Ahmad, Johanna, Hassan, Rohayanti, Baharom, Salmi, Antari, Dwinta Suci

    Published 2025
    “…String Distance aims to find the degree of similarity between the test cases, which helps prioritize the test case according to the dissimilar value. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Scentopia: Navigating the World of Fragrance by Abd Mutalib, Nurrul Kamaliah

    Published 2024
    “…In order to solve the difficulties customers encounter while attempting to navigate the bewildering array of perfumes on the market, this study presents the creation of “Scentopia” as a Final Year Project. The programme streamlines the perfume picking process and directs users towards their ideal smell match by utilising cutting-edge algorithms, personalised scent profile, and user-friendly interfaces. …”
    Get full text
    Get full text
    Final Year Project
  11. 11

    The implications for ahybrid detection technique against malicious sqlattacks on web applications by Bahjat Arif, Sarajaldeen Akram, Wani, Sharyar

    Published 2025
    “…The proposed DetectCombined is an innovated technique that execute a protection code based on a sequence of three stages: filtration-validation-history, this technique produces a robust protection code that distinguish between safe SQL commands and malicious ones, and reinforce the memory of detection procedure by saving previous SQL attacks in special tables in the remote database, regardless of the types of users whether a general user of admin. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12
  13. 13

    Constrained clustering approach to aid in remodularisation of object-oriented software systems / Chong Chun Yong by Chong, Chun Yong

    Published 2016
    “…Effective execution of software maintenance requires knowledge of the detailed working of software. …”
    Get full text
    Get full text
    Thesis
  14. 14

    The prevalence and functional impact of rare genomic copy number variation in hypertension-related left ventricular hypertrophy / Julia Ashazila Mat Jusoh by Mat Jusoh, Julia Ashazila

    Published 2020
    “…In conclusion, more than a quarter of hypertensive male Malaysians had LVH and genetic factor (rare CNV) plays a contributing factor to the development of HT LVH+ through alteration of the functional regulation of foetal cardiac gene programme. …”
    Get full text
    Get full text
    Thesis