Search Results - (( future interactive learning algorithm ) OR ( java application designing algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
    Get full text
    Get full text
    Final Year Project
  2. 2
  3. 3

    On Adopting Parameter Free Optimization Algorithms for Combinatorial Interaction Testing by Kamal Z., Zamli, Alsariera, Yazan A., Nasser, Abdullah B., Alsewari, Abdulrahman A.

    Published 2015
    “…Addressing this issue, this paper proposes the adoption of parameter free optimization algorithms as the basis of future t-way strategies. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4
  5. 5

    Autism Spectrum Disorder Classification Using Deep Learning by Abdulrazak Yahya, Saleh, Lim Huey, Chern

    Published 2021
    “…In the future, different types of deep learning algorithms need to be applied, and different datasets can be tested with different hyper-parameters to produce more accurate ASD classifications.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Kodepoly: an engaging approach to blended futuristic learning in coding by Abd Rahman, Norsyafrina, Azhar Amanullah, Ayn Nur Azhana

    Published 2024
    “…By combining the strategic elements of Monopoly with a curriculum comprised of coding challenges, debugging exercises, and algorithmic puzzles, Kodepoly aims to render the learning process both enjoyable and substantial in content. …”
    Get full text
    Get full text
    Proceeding Paper
  7. 7

    Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework by Asaad Aref, Ibrahim

    Published 2004
    “…Java Media Framework library and the RTP protocol for audio transmission were used as development tools.The developed system designed in this thesis together with experimental results proved that the system could be implemented successfully. …”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9

    Immune network algorithm in monthly streamflow prediction at Johor river by Mat Ali, Nur Izzah, Abdul Malik, Marlinda, Ismail , Amelia Ritahani

    Published 2014
    “…AIS has the abilities of self-organizing, memory, recognition, adaptive and ability of learning inspired from the immune system. Immune Network Algorithm is part of the three main algorithm in AIS. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  10. 10

    How Does Image Complexity Affect the Accuracy of an Interactive Image Segmentation Algorithm? by Kok Luong, Goh, Soo See, Chai, Muzaffar, Hamzah, Emily Sing, Kiang Siew

    Published 2025
    “…The adaptive strategy improves segmentation performance and guides the development of robust algorithms. Future research can further refine the adaptive approach, explore additional complexity measures, and incorporate advanced machine learning techniques to enhance interactive image segmentation. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    An adaptive HMM based approach for improving e-Learning methods by Deeb B., Hassan Z., Beseiso M.

    Published 2023
    “…Both techniques are used to devise an adaptive algorithm which efficiently manages the clustering of students based on their VAK aptitudes and predicts the future e-learning framework for these students. …”
    Conference Paper
  12. 12

    Immune network algorithm in monthly streamflow prediction at Johor river by Ali N.I.M., Malek M.A., Ismail A.R.

    Published 2023
    “…AIS has the abilities of self-organizing, memory, recognition, adaptive and ability of learning inspired from the immune system. Immune Network Algorithm is part of the three main algorithm in AIS. …”
    Article
  13. 13
  14. 14

    Immune network algorithm in monthly streamflow prediction at Johor river by Mat Ali, Nur Izzah, Abdul Malek, Marlinda, Ismail, Amelia Ritahani

    Published 2015
    “…AIS has the abilities of self-organizing, memory, recognition, adaptive and ability of learning inspired from the immune system. Immune Network Algorithm is part of the three main algorithm in AIS. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  15. 15
  16. 16

    CT-eKit: computational thinking interactive learning / Ong Sing Ling, Jill Ling and Fetylyana Nor Pazilah by Ong, Sing Ling, Jill, Ling, Pazilah, Fetylyana Nor

    Published 2023
    “…The CT-eKit consists of three main activities: a CT video, a Kahoot CT quiz and a Scratch CT Concepts game to learn the four CT concepts: decompose, pattern, abstraction and algorithm in a fun and interactive environment. …”
    Get full text
    Get full text
    Book Section
  17. 17

    'Chapter 7: Smartphone penetration test: Securing Industry 5.0 mobile applications' in "1st Edition, The Future of Human-Computer Integration Industry 5.0 Technology, Tools, and Al... by Eka Wahyu, Aditya, Nur Haryani, Zakaria, Fazli, Azzali, Mohamad Nazim, Jambli

    Published 2024
    “…The Future of Human-Computer Integration: Industry 5.0 Technology, Tools, and Algorithms provides a valuable insight into how Industry 5.0 technologies, tools, and algorithms can revolutionise industries and drive innovation. …”
    Get full text
    Get full text
    Get full text
    Book Chapter
  18. 18

    Network game (Literati) / Chung Mei Kuen by Chung, Mei Kuen

    Published 2003
    “…The main aspect of this thesis is to produce a networked gaming system, which process players. requested to play the game and enabling users to play the graphical game with people through the network. The algorithm design and implementation method must not only be workable, but also highly efficient in terms of execution speed and response time. …”
    Get full text
    Get full text
    Thesis
  19. 19

    SANAsms: Secure short messaging system for secure GSM mobile communication by Anuar, N.B., Azlan, I.M., Wahid, A.W.A., Zakaria, O.

    Published 2008
    “…The application is designed to satisfy the user friendly interfaces and intent to be used by the end user without having the advanced knowledge in mobile security. …”
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20