Search Results - (( java application customization algorithm ) OR ( using interacted connection algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3
  4. 4

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Network game (Literati) / Chung Mei Kuen by Chung, Mei Kuen

    Published 2003
    “…It should be an interesting, time and value worth topic to research on. By using Java applet, it will give a good interactive response since it does not suffer from the delays or variability of bandwidth associated with network connection. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    Combination of GREEN and SHRed AQM for short-lived traffic by Shaii, Ahmad Qadafi, Ismail, Roslan, Jais, Jamilin

    Published 2008
    “…To evaluate the performance of new algorithm, network simulation has been done using NS-2 simulation.This study provides a series of NS-2 experiments to investigate the behavior of new algorithm.The results show improvement on short-lived traffic.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    Mobile application for sign language learning with real time feedback by Lee, Xiao Xu Alexis

    Published 2024
    “…A major innovation of this project involves integrating computer vision and machine learning for real-time sign recognition and feedback during signing exercises. Machine learning algorithms using MediaPipe and deep learning will analyse users' hand motions to provide corrections for improving technique. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  9. 9

    Smart Irrigation System Using Raspberry Pi by Sahrom, Ahmad Syamil, Aminuddin, Raihah

    Published 2020
    “…The irrigation is automated by using machine learning algorithm that has been implemented on the system. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    Software agent as an effective tool for managing the Internet of thing data complexity by Mustafa, M.B., Yusoof, M.A.M.

    Published 2017
    “…Today the Internet serves many purposes, from social interaction to information search and conducting business activities to smart connectivity. …”
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    Wireless data gloves Malay sign language recognition system by Tan, Tian Swee, Ariff, Ahmad Kamarul, Shaikh Salleh, Sheikh Hussain, Siew, Kean Seng, Leong, Seng Huat

    Published 2007
    “…This Human-Computer Interaction system is able to recognize 25 common words signing in Bahasa Isyarat Malaysia (BIM) by using Hidden Markov Models (HMM) methods. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12

    Development Of Semi-Automatic Liver Segmentation Method For Three-Dimensional Computed Tomography Dataset by Chiang, Yi Fan

    Published 2017
    “…Then, morphological closing and opening are used close small holes inside liver region and break the thin connections between liver and neighbouring organs. …”
    Get full text
    Get full text
    Monograph
  13. 13

    Computer remote monitoring via mobile phones using socket programming / Samih Omer Fadlelmola Elkhider by Omer Fadlelmola Elkhider, Samih

    Published 2011
    “…Sockets programming is one f the most basic and useful method of achieving any client server connectivity. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Enhance efficiency of answering XML keyword query using incompact structure of MCCTree by Sazaly, Ummu Sulaim

    Published 2012
    “…If the result cannot be used directly by the ranking method, the algorithm has an ineffective process. …”
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16

    An augmented reality real-time cloud-based remote monitoring algorithm for a manufacturing system / Siti Aisyah Jaafar by Jaafar, Siti Aisyah

    Published 2021
    “…This was achieved through data transfer using Amazon Web Service (AWS-IoT) cloud connection. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Optimization and discretization of dragonfly algorithm for solving continuous and discrete optimization problems by Bibi Amirah Shafaa, Emambocus

    Published 2024
    “…Swarm intelligence algorithms are metaheuristic algorithms inspired by the simple interactions of biological organisms in a population. …”
    Get full text
    Get full text
    Thesis
  18. 18

    An Empirical Evaluation of Artificial Intelligence Algorithm for Hand Posture Classification by Hussain, A., Hussain, S.S., Uddin, M.M., Zubair, M., Kumar, P., Umair, M.

    Published 2022
    “…In this connection, a recent dataset, â��Mocap Hand Postures Data Set,â�� has been opted to employ the different variants of the machine learning algorithm. …”
    Get full text
    Get full text
    Article
  19. 19

    Developement of 3D virtual environment for Teratai College, UiTM Shah Alam using open source platform / Tengku Mohd Najib Tengku Ishak by Tengku Ishak, Tengku Mohd Najib

    Published 2006
    “…Once built, a user is able to move freely through the building interactively when the 3D objects save as *wrl format can be access by using plug-in player in web format. …”
    Get full text
    Get full text
    Thesis
  20. 20