Search Results - (( java application designing algorithm ) OR ( program program stemming algorithm ))
Search alternatives:
- application designing »
- designing algorithm »
- stemming algorithm »
- java application »
- program stemming »
-
1
To enhance existing Malay stemming algorithm starting with the letter 'D' / Mohd Nazril Hafez Mohd Supandi
Published 2000“…The performance of a Malay stemming algorithm is tested based on words that beginning with 'd', using 4 experiments. …”
Get full text
Get full text
Thesis -
2
-
3
To improve stemming algorithm on Malay words begin with alphabet B / Norasiah Ismail
Published 2001“…The performance on words beginning with letter 'b' of Malay stemming algorithm are tested using 5 experiments. …”
Get full text
Get full text
Thesis -
4
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
5
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
6
The study of stemming algorithm on Malay words that begin with alphabets P, Q, Y, and Z from the translated Al-Quran / Suriani Mat
Published 2001“…The performance of a Malay stemming algorithm is tested based on words beginning with letter 'p', 'q', 'y' and 'z', using 5 experiments. …”
Get full text
Get full text
Thesis -
7
Development of an open-source and low-cost robotic arm based on STM32 microcontroller for promoting STEM education
Published 2023“…The control algorithm for a 3D-printed MK2 robot arm was programmed with an STM32 microcontroller. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
8
-
9
Ciphercrypt-an Encryption System / Nor Hidayah Ngah
Published 2004“…This system is implemented on a Windows platform with Visual Basic as a programming language and 3-DES as a main encryption algorithm. …”
Get full text
Get full text
Thesis -
10
Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework
Published 2004“…Java Media Framework library and the RTP protocol for audio transmission were used as development tools.The developed system designed in this thesis together with experimental results proved that the system could be implemented successfully. …”
Get full text
Get full text
Thesis -
11
Impact of Computational Thinking and Computer Science (CTCS) Teaching Technique at Seleceted Schools in Sarawak : A Qualitative Analysis
Published 2023“…Between 2017 and 2020, the Faculty of Computer Science and Information Technology (FCSIT), UNIMAS conducted teaching certificate program for teachers, and outreach program based on digital making, programming, and robotics for students to increase their readiness in digital knowledge through computational thinking and computer science (CTCS). …”
Get full text
Get full text
Get full text
Proceeding -
12
Robotics in Education
Published 2026“…Spanning six chapters, it examines robotics’ ability to enhance technical and collaborative skills while addressing challenges such as resource accessibility and curriculum integration. Core programming concepts, including control systems, algorithm design, and debugging, are elaborated upon using tools like Python and ROS. …”
Get full text
Get full text
Get full text
Get full text
Book -
13
-
14
Design Of Robot Motion Planning Algorithm For Wall Following Robot
Published 2006Get full text
Get full text
Monograph -
15
-
16
Network game (Literati) / Chung Mei Kuen
Published 2003“…The main aspect of this thesis is to produce a networked gaming system, which process players. requested to play the game and enabling users to play the graphical game with people through the network. The algorithm design and implementation method must not only be workable, but also highly efficient in terms of execution speed and response time. …”
Get full text
Get full text
Thesis -
17
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…The application is designed to satisfy the user friendly interfaces and intent to be used by the end user without having the advanced knowledge in mobile security. …”
Get full text
Get full text
Conference or Workshop Item -
18
Comparison of algorithm Support Vector Machine and C4.5 for identification of pests and diseases in chili plants
Published 2019“…In this study comparing the performance classification techniques of Support Vector Machine (SVM) and C4.5 algorithms. The attributes used consist of Leaves, Stems, and Fruits. …”
Get full text
Get full text
Conference or Workshop Item -
19
-
20
Improving Class Timetabling using Genetic Algorithm
Published 2006“…We have targeted the research on class timetabling problem. Hence, Genetic Algorithm (GA) is used as one of the most popular optimization solutions. …”
Get full text
Get full text
Get full text
Thesis
