Search Results - (( java application modified algorithm ) OR ( basic evaluation focus algorithm ))

Refine Results
  1. 1
  2. 2

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…A GUI is created in a form of JAVA application to display data detected from tag. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Automatic generation of content security policy to mitigate cross site scripting by Mhana, Samer Attallah, Din, Jamilah, Atan, Rodziah

    Published 2016
    “…The algorithm is implemented as a plugin. It does not interfere with the web application original code. …”
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4
  5. 5
  6. 6
  7. 7

    User to user topic recommendation model for student social interaction by Ahmad Subhi, Zolkafly

    Published 2025
    “…The results show that the Parameterized Basic Ranking Evaluation Function (PBREF) has higher accuracy (69.90%) than Parameterized Multiple Classifier Ranking Evaluation Function (PMCREF) with 64.58%. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9

    Hybrid artificial bee colony algorithm with branch and bound for two–sided assembly line balancing by Elteriki, Salem Abdulsalam

    Published 2018
    “…However, not many types of research are focused on the study of the 2SALB problem. Recently, the artificial bee colony (ABC) algorithm was used in the solution process where it was considered as a very useful, effective and well-known algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    Stereo vision for visual object tracking and distance measurement assessment / Sukarnur Che Abdulla...[et al.] by Che Abdullah, Sukarnur, Amari, Mohamad Dzulhelmy, Ohka, Masahiro

    Published 2019
    “…Furthermore, the project proposes a new program algorithm for binocular vision system to work, in order to identify distance of an object with a basic equation has been derived and set in the designed algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Simulation on Emotion Recognition for Autism Therapy by Adzmi, Muhammad Azrin

    Published 2017
    “…This paper mainly focusing on the simulation of emotion recognition software based on the Local Binary Pattern (LBP) algorithm to extract the features from the image. …”
    Get full text
    Get full text
    Final Year Project
  12. 12

    Association ruleset formulation for cyberattack attribution process in cyber threat intelligence using apriori algorithm by Abu, Md Sahrom

    Published 2021
    “…The CTI-AR was evaluated and validated to verify its effectiveness in identifying cyberattack attribution level by using an experimental approach. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    Algorithm-program visualization model : An intergrated software visualzation to support novices' programming comprehension by Affandy

    Published 2015
    “…This model is then to be used in the prototype tool development that is called 3De-ALPROV (Design Development Debug – Algorithm Program Visualization). The efficacy evaluation of the prototype is based on pre- and post- test of the students’ programming performance. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    Optimization of Motion Compensated Block-Based DCT Video Compression for Software Implementation by Chen, Soong Der

    Published 2000
    “…For the algorithmic aspect, the basic principles of motion compensated DCT block-based compression scheme was studied. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system by Beg, Abul Hashem

    Published 2011
    “…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Development of axis movement controller for 2-axis configuration machine control by Haidil Hazha, Husaini

    Published 2007
    “…The aim of the project is to control the movement of conveyor for every 1cm per step, forward and reverse. The axis control algorithm is program in the PIC16F877 microcontroller using software PIC proBasic. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  17. 17

    A phonetically rich and balanced lexical corpus using zipfian distribution for an under resourced language / Aminath Farshana by Aminath , Farshana

    Published 2018
    “…The performance of the proposed method was also evaluated by comparing the results with an existing benchmark method (greedy algorithm). …”
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    Comparative study of 3D reconstruction methods from 2D sequential images in sports by Azrulhizam Shapi’i, Pichak, Sanaz, Mohd Syazwan Baharuddin, Iida, Hiroyuki

    Published 2020
    “…These researches have been developed the algorithm that be able to solve illposed problem. Evaluation of the methods was divided in two sections. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19
  20. 20

    An analysis of the AAḃ asymmetric encryption scheme on embedded devices for IoT environment / Syed Farid Syed Adnan by Syed Adnan, Syed Farid

    Published 2019
    “…The experimental analysis focused on the AAḃ algorithm's performance on embedded platforms, namely, the Raspberry Pi microcomputer and microcontroller (ARM Cortex-M7) platforms. …”
    Get full text
    Get full text
    Thesis