Search Results - (( java application path algorithm ) OR ( course extraction method algorithm ))

  • Showing 1 - 11 results of 11
Refine Results
  1. 1

    Smart appointment organizer for mobile application / Mohd Syafiq Adam by Adam, Mohd Syafiq

    Published 2009
    “…In creating this application, NetBeans IDE 6.5and Java Micro Edition (Java ME) are used. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Visdom: Smart guide robot for visually impaired people by Lee, Zhen Ting

    Published 2025
    “…The system architecture integrates ROS 2 on a Raspberry Pi, with TCP/IP connectivity enabling remote operation. An Android mobile application, developed using Java and the java.net.Socket library, provides an intuitive and accessible user interface for seamless interaction with the robot. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  3. 3

    Visdom: Smart guide robot for visually impaired people by Lee, Zhen Ting

    Published 2025
    “…The system architecture integrates ROS 2 on a Raspberry Pi, with TCP/IP connectivity enabling remote operation. An Android mobile application, developed using Java and the java.net.Socket library, provides an intuitive and accessible user interface for seamless interaction with the robot. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  4. 4

    Using algorithmic taxonomy to evaluate lecturer workload by Hashim, Ruhil Hayati, Abdul Hamid, Jamaliah, Selamat, Mohd Hasan, Ibrahim, Hamidah, Abdullah, Rusli, Mohayidin, Mohd Ghazali

    Published 2006
    “…Results of the study highlight the contributions of this algorithmic method in better evaluation of teaching workload for lecture.…”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Using algorithmic taxonomy to evaluate lecture workload: a case study of services application prototype in the UPM KM Portal by Abdul Hamid, Jamaliah, Mohayidin, Mohd Ghazali, Selamat, Mohd Hasan, Ibrahim, Hamidah, Abdullah, Rusli, Hashim, Ruhil Hayati

    Published 2006
    “…Results of the study highlight the contributions of this algorithmic method in better evaluation of teaching workload for lecture.…”
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    Fingerprint recognition using neural networks / Kennie Yeoh Eng Hoe by Kennie Yeoh , Eng Hoe

    Published 2001
    “…Alternatively, patch-matching algorithm was developed in success of the Fourier Transform method when results -were not favorable to it. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Using algorithmic taxonomy to evaluate lecture workload: A case study of services application prototype in the UPM KM portal by Abdul Hamid, Jamaliah, Mohayidin, Mohd Ghazali, Selamat, Mohd Hassan, Ibrahim, Hamidah, Abdullah, Rusli, Hashim, Ruhil Hayati

    Published 2006
    “…Lecturer workload at universities includes three major categories: teaching, research and services.Teaching workload is influence by various factors such as level taught courses, number of student, credit and contact hour and off campus or on campus course design.The UPM has a KM Portal that contains sets of metadata on lecturer profile and knowledge assets.The Lecturer profile contains information lecturer teaching, research, publication and many more.We constructed an algorithmic taxonomy based at the lecturer profile data to measure lecturer teaching workload.This method measures the lecturer teaching workload.The taxonomy is a dynamic hierarchy that extracts validated parameters from the dataset.Results of the study highlight the contributions of this algorithmic method in better evaluation of teaching workload for lecture.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    An Efficient IDS Using Hybrid Magnetic Swarm Optimization in WANETs by Sadiq, Ali Safaa, Alkazemi, Basem, Mirjalili, Seyedali, Ahmed, Noraziah, Khan, Suleman, Ali, Ihsan, Pathan, Al-Sakib Khan, Ghafoor, Kayhan Zrar

    Published 2018
    “…Our developed algorithm works in extracting the most relevant features that can assist in accurately detecting the network attacks. …”
    Get full text
    Get full text
    Article
  9. 9

    An efficient IDS using hybrid Magnetic swarm optimization in WANETs by Sadiq, Ali Safa, Alkazemi, Basem Y., Mirjalili, Seyedali, Noraziah, Ahmad, Khan, Suleman, Ihsan, Ali, Pathan, Al-Sakib Khan, Ghafoor, Kayhan Zrar

    Published 2018
    “…Our developed algorithm works in extracting the most relevant features that can assist in accurately detecting the network attacks. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Haemoglobin distribution in ulcers for healing assessment by Malik, Aamir Saeed, Fadzil, A. F. M., Arshad, Leena, Jamil, Adawiyah, Yap, Felix

    Published 2012
    “…Data clustering techniques are implemented to classify and segment detected regions of granulation tissue from the extracted haemoglobin images. Results obtained indicate that the developed algorithm performs fairly well with an average sensitivity of 88.24% and specificity of 98.82% when compared to the dermatologist's assessment. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11