Search Results - (( java application model algorithm ) OR ( basic evaluation tree algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3
  4. 4

    BMTutor research design: Malay sentence parse tree visualization by Muhamad Noor, Yusnita, Jamaludin, Zulikha

    Published 2014
    “…As a result of the lack of models and algorithms have been introduced in both parsers, the model and algorithm development phase is introduced in the design of BMTutor.Output from the development process shows that the prototype is able to provide sentence correction for all 15 invalid sentences and can produce parse tree visualizations for all 20 sentences used for prototype testing.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5
  6. 6

    Real-time algorithmic music composition application. by Yap, Alisa Yi Hui

    Published 2022
    “…This project is about the study of evolutionary music, and focuses on the development of an algorithmic music composer using the Java programming language. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  7. 7

    Image Based Oil Palm Tree Crowns Detection by Muhammad Afif Zakwan, Zaili

    Published 2020
    “…Image Based Oil Palm Tree Crowns Detection system is a basic system that enables the detection of oil palm tree crowns from red, green and blue (RGB) aerial images. …”
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  8. 8

    Reliability of bench-mark datasets for crowd analytic surveillance by Ameen, Mohamed Abul Hassan, Malik, Aamir Saeed, Nicolas, Walter, Faye , Ibrahima, Nordin, Nadira

    Published 2015
    “…The diverseness of these databases are assessed, with respect to the performance of the basic algorithms using qualitatively and quantitatively. …”
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9
  10. 10
  11. 11

    Reliability of bench-mark datasets for crowd analytic surveillance by Hassan, M.A., Malik, A.S., Nicolas, W., Faye, I., Nordin, N.

    Published 2015
    “…The diverseness of these databases are assessed, with respect to the performance of the basic algorithms using qualitatively and quantitatively. …”
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12

    Reliability of bench-mark datasets for crowd analytic surveillance by Hassan, M.A., Malik, A.S., Nicolas, W., Faye, I., Nordin, N.

    Published 2015
    “…The diverseness of these databases are assessed, with respect to the performance of the basic algorithms using qualitatively and quantitatively. …”
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13
  14. 14

    A Toolkit for Simulation of Desktop Grid Environment by FOROUSHAN, PAYAM CHINI

    Published 2014
    “…In this type of environment it is nearly impossible to prove the effectiveness of a scheduling algorithm. Hence the main objective of this study is to develop a desktop grid simulator toolkit for measuring and modeling scheduler algorithm performance. …”
    Get full text
    Get full text
    Final Year Project
  15. 15

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…The objective of this study is to enhance the confidentiality and security of the image steganography application by combining cryptography algorithm. In this proposed model, the RSA algorithm is used to encrypt a secret message into an unreadable ciphertext before hiding it in the image. …”
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment by Ruzita, Ahmad

    Published 2013
    “…This thesis describes original research in the field of software quality model by presenting a Feature Ranking Algorithm (FRA) for Pragmatic Quality Factor (PQF) model. …”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18

    Extracting crown morphology with a low-cost mobile LiDAR scanning system in the natural environment by Wang, Kai, Zhou, Jun, Zhang, Wenhai, Zhang, Baohua

    Published 2021
    “…The algorithm defined in this study was evaluated with manual measurements as reference, and the morphological parameters of the canopy obtained using the LOAM and LeGO-LOAM algorithms as the basic framework were compared. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Network game (Literati) / Chung Mei Kuen by Chung, Mei Kuen

    Published 2003
    “…Therefore, efficient and robust servers that process separate client connections in separate threads are needed. Java applet is a well-known and widely used example of mobile code (a variation on the traditional client-server model). …”
    Get full text
    Get full text
    Thesis
  20. 20