Search Results - (( java application during algorithm ) OR ( using interactive circular algorithm ))

  • Showing 1 - 16 results of 16
Refine Results
  1. 1

    Interaction diagram and response surface plot of pretensioned inverted T-beam with circular web openings by Cheng, Hock Tian, Bashar, S. Mohammed, Kamal Nasharuddin, Mustapha

    Published 2009
    “…In this paper, the non-linear analysis, interaction diagram and deflection response surface plot of simply supported pretensioned inverted T-beam with circular web openings are presented. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Interaction diagram and response surface plot of pretensioned inverted T-beam with circular web openings by Cheng H.T., Mohammed B.S., Mustapha K.N.

    Published 2023
    “…In this paper, the non-linear analysis, interaction diagram and deflection response surface plot of simply supported pretensioned inverted T-beam with circular web openings are presented. …”
    Article
  3. 3

    A Two Pressure-Velocity Approach for Immersed Boundary Methods in Three Dimensional Incompressible Flows by Tuan Mohammad Yusoff, Tuan Ya, Sabir, O., Norhafizan, Ahmed, Y., Nukman

    Published 2013
    “…The algorithm calculates the interactions between incompressible viscous flows and a solid shape in three-dimensional domain. …”
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    SUDOKU HELPER by Abdul Razak, Muhammad Asyraf

    Published 2015
    “…In this paper research, author presents an algorithm to provide a tutorial for any Sudoku player who got stuck during the solving process. …”
    Get full text
    Get full text
    Final Year Project
  5. 5

    Adaptive mesh refinement immersed boundary method for simulations of laminar flows past a moving thin elastic structure by Aldlemy, M.S., Rasani, M.R., Ariffin, A.K., Ya, T.M.Y.S.T.

    Published 2020
    “…Hence, in this work, an algorithm is developed to simulate fluid-structure interactions of moving deformable structures with very thin thicknesses. …”
    Get full text
    Get full text
    Article
  6. 6

    Machine learning‐based approach for bandwidth and frequency prediction of circular SIW antenna by Alam, Md Mahabub, Nurhafizah, Abu Talip Yusof, Ahmad Afif, Mohd Faudzi, Tomal, Md Raihanul Islam, Haque, Md Ershadul, Rahman, Md. Suaibur

    Published 2025
    “…A predictive ML framework was developed using six regression algorithms trained on significant geometrical parameters, such as ring slot radius, via diameter, and feedline width. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    STUDIES ON THE NONLINEAR INTERACTIONS ASSOCIATED WITH MOORED SEMI SUBMERSIBLE OFFSHORE PLATFORMS by NOUR ELFADUL ABBAS, YASSIR MOHAMMEDNOUR ELFADUL ABBAS

    Published 2011
    “…In the second phase, a semi submersible with six circular columns was modeled using the same scale as for the first semi submersible. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Talkout : Protecting mental health application with a lightweight message encryption by Gavin Teo Juen

    Published 2022
    “…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  9. 9

    Restaurant review system with data visualization and text search using TF-IDF algorithm / Syazwina Abd Hamid by Abd Hamid, Syazwina

    Published 2020
    “…Meanwhile, for visualization, D3.js library is used with aim to promote interactivity and enhance user experience when using the system. …”
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11
  12. 12

    A malware analysis and detection system for mobile devices / Ali Feizollah by Ali, Feizollah

    Published 2017
    “…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications by Hydara, Isatou

    Published 2015
    “…This research work was limited to Java based web applications. In future research, the method can be extended to include other programming languages as well as other similar web application security vulnerabilities.…”
    Get full text
    Get full text
    Thesis
  14. 14

    Human activity recognition via accelerometer and gyro sensors by Tee, Jia Lin

    Published 2023
    “…To implement the data engineering system proposed, two mobile applications, SensorData and SensorDataLogger with user-friendly interfaces and intuitive functionalities are developed using Java programming language and Android Studio. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  15. 15

    Design & Development of a Robotic System Using LEGO Mindstorm by Abd Manap, Nurulfajar, Md Salim, Sani Irwan, Haron, Nor Zaidi

    Published 2006
    “…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. Ultimately, the algorithm development program designed earlier is linked up directly to the robotic model for program implementation and verification. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system by Beg, Abul Hashem

    Published 2011
    “…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
    Get full text
    Get full text
    Thesis