Search Results - (( java application during algorithm ) OR ( systematic implementation level algorithm ))
Search alternatives:
- systematic implementation »
- implementation level »
- application during »
- java application »
- during algorithm »
- level algorithm »
-
1
SUDOKU HELPER
Published 2015“…In this paper research, author presents an algorithm to provide a tutorial for any Sudoku player who got stuck during the solving process. …”
Get full text
Get full text
Final Year Project -
2
Optimize performance load balancing techniques using binary vote assignment grid quorum (BVAGQ): A systematic review
Published 2019Get full text
Get full text
Get full text
Conference or Workshop Item -
3
Neutral-point voltage deviation control for three-level inverter-based shunt active power filter with fuzzy-based dwell time allocation
Published 2017“…The proposed method is called the fuzzy-based dwell time allocation algorithm. To validate effectiveness and feasibility of the proposed algorithm, simulation work in MATLAB-Simulink and experimental implementation utilising TMS320F28335 digital signal processor (DSP) are performed. …”
Get full text
Get full text
Get full text
Article -
4
A technical framework analysis of digital twin control algorithms for HVAC-BMS Integration and implementation challenges for Malaysian green buildings
Published 2025“…Using PRISMA methodology, 36 articles published between 2020 - 2024 were systematically reviewed, analysing implementation frameworks, energy optimization strategies, and security considerations. …”
Get full text
Get full text
Get full text
Article -
5
Systematic review on ai-blockchain based e-healthcare records management systems
Published 2022“…Researchers have identified three categories of blockchain-based potential solutions for the management of electronic health records: conceptual, prototype, and implemented. The purpose of this research work is to conduct a Systematic Literature Review (SLR) to identify and assess research articles that were either conceptual or implemented to manage EHRs using blockchain technology. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
6
Systematic review on ai-blockchain based e-healthcare records management systems
Published 2022“…Researchers have identified three categories of blockchain-based potential solutions for the management of electronic health records: conceptual, prototype, and implemented. The purpose of this research work is to conduct a Systematic Literature Review (SLR) to identify and assess research articles that were either conceptual or implemented to manage EHRs using blockchain technology. …”
Get full text
Get full text
Get full text
Article -
7
Development of a systematic method in lean tool selection for automotive industry
Published 2012“…The developed software probably assists manufacturers in applying the systematic lean tool selection. Based on the systematic features of this algorithm, the efficiency and effectiveness of the model in presenting optimizing techniques for lean tool selection with the automotive industry seems reasonable and useful. …”
Get full text
Get full text
Thesis -
8
Optimization Algorithms: A Comparison Study for Scheduling Problem at UIN Raden Fatah's Sharia and Law Faculty
Published 2024“…The research encompasses a systematic approach, beginning with a clear definition of constraints and objectives, followed by designing and implementing both algorithms to address the scheduling issues at the Faculty of Sharia and Law. …”
Get full text
Get full text
Get full text
Get full text
Article -
9
Talkout : Protecting mental health application with a lightweight message encryption
Published 2022“…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
Get full text
Get full text
Get full text
Academic Exercise -
10
-
11
Techniques and strategies to minimize radiation exposure in pediatric computed tomography (CT) abdominal examinations: a review
Published 2024“…To reduce the ionizing radiation dose while still obtaining high-quality diagnostic images, healthcare practitioners should adhere to DRL, adjust exposure factors, implement prefiltration, employ AI, and use post-processing algorithms.…”
Get full text
Get full text
Get full text
Article -
12
An Improved Diabetes Risk Prediction Framework : An Indonesian Case Study
Published 2018“…In the learning section,Support Vector Machine and Artificial Neural Network were selected as suitable classification algorithms,while Gradient Boosted Tree was employed to interpret the rule based on the black box classifiers.Testing the framework involved Pima Indian Dataset as public dataset and Semarang Hospital Dataset as private dataset (800 patients’ data).In validating the DRPF,four case studies investigated Subject Matter Expert (SME) groups based on the agreement level.The questionnaire consists of a DRPF component,implementation of DRPF,and viability of DRPF.DRPF components were validated by the SMEs,whereby the group ascertained five highest risk factors:HbA1c,systole/diastole,blood glucose,and creatinine and blood urea nitrogen that were assigned by attribute weighting.Results from the questionnaire revealed an average agreement level of 80%. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
13
-
14
Beyond the classroom: digital language learning in the Malaysian context
Published 2024“…Using PRISMA methodology, 36 articles published between 2020 - 2024 were systematically reviewed, analysing implementation frameworks, energy optimization strategies, and security considerations. …”
Get full text
Get full text
Get full text
Article -
15
-
16
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis -
17
An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications
Published 2015“…This research work was limited to Java based web applications. In future research, the method can be extended to include other programming languages as well as other similar web application security vulnerabilities.…”
Get full text
Get full text
Thesis -
18
Human activity recognition via accelerometer and gyro sensors
Published 2023“…To implement the data engineering system proposed, two mobile applications, SensorData and SensorDataLogger with user-friendly interfaces and intuitive functionalities are developed using Java programming language and Android Studio. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
19
Enhancement of Security Architecture for Smartcard Based Authentication Protocols
Published 2004“…To identify the best cryptographic algorithm suitable for smartcard applications, the dissertation also investigates the implementation of Elliptic Curve encryption techniques and presents performance comparisons based on similar techniques. …”
Get full text
Get full text
Thesis -
20
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. Ultimately, the algorithm development program designed earlier is linked up directly to the robotic model for program implementation and verification. …”
Get full text
Get full text
Get full text
Conference or Workshop Item
