Search Results - (( java communication research algorithm ) OR ( program visualisation a algorithm ))
Search alternatives:
- program visualisation »
- java communication »
- research algorithm »
- visualisation a »
- a algorithm »
-
1
Effectiveness of algorithm visualisation in studying complex algorithms: a case study using TRAKLA Ravie / Chandren Muniyandi, Ali Maroosi
Published 2015“…Algorithm visualisation (AV) can be utilised to improve students ’programming and programme comprehension skills. …”
Get full text
Get full text
Get full text
Article -
2
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…Internet communication has become more common in this modern world recently, and one of the important algorithms used is ABS algorithm. …”
Get full text
Get full text
Undergraduates Project Papers -
3
Design of Improved Stream Cipher Algorithms for GSM Communication
Published 2024thesis::master thesis -
4
The efficacy of personal computer (PC) AI image enhancer software on low and high contrast PA chest radiograph: an experimental study
Published 2026“…Methods: An experimental investigation was undertaken using five PC AI image enhancer programs to visualise the thoracic anatomy. Experts examined the radiographs using visual grading analysis (VGA), which involves visualising 16 common chest anatomical features. …”
Get full text
Get full text
Get full text
Get full text
Article -
5
Network game (Literati) / Chung Mei Kuen
Published 2003“…It should be an interesting, time and value worth topic to research on. By using Java applet, it will give a good interactive response since it does not suffer from the delays or variability of bandwidth associated with network connection. …”
Get full text
Get full text
Thesis -
6
Correlation analysis and predictive performance based on KNN and decision tree with augmented reality for nuclear primary cooling process / Ahmad Azhari Mohamad Nor
Published 2024“…The intricate nature of these systems demands a well-managed maintenance program, prompting the need for a comprehensive characterisation of the primary cooling system. …”
Get full text
Get full text
Thesis -
7
A cluster-based hybrid replica control protocol for high availability in data grid
Published 2019“…Another proposed algorithm is replica placement algorithm which selects and places only one replica in each cluster. …”
Get full text
Get full text
Thesis -
8
Text messaging encryption system
Published 2012“…The programming language that is used to write the program is Java Language.…”
Get full text
Get full text
Undergraduates Project Papers -
9
Securing cloud data system (SCDS) for key exposure using AES algorithm
Published 2021“…In our research project we use to build a local website using the NetBeans Java averments and create our database management by using MySQL language. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
10
Reconstruction algorithm of calibration map for RPT technique in quadrilateral bubble column reactor using MCNPX code
Published 2018“…Calibration algorithm was developed for radioactive isotopes Au-198 and Sc-46 particle position verification and determination of statistical uncertainty from the introduction of a various number of primary photon emission. …”
Get full text
Get full text
Get full text
Article -
11
-
12
Extracting Object Oriented Software Architecture from C++ Source Code
Published 2000Get full text
Get full text
Thesis -
13
FBGA-based implementation of electronic abacus using altera DE2 board
Published 2017“…DE2 115 is chosen as the development module and VHDL as main programming language. The arithmetic algorithm developed for the electronic abacus is limited to the computational of whole numbers only. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
14
Mathematical simulation for 3-dimensional temperature visualization on open source-based grid computing platform
Published 2009“…The development of this architecture is based on several programming language as it involves algorithm implementation on C, parallelization using Parallel Virtual Machine (PVM) and Java for web services development. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
15
A multi-filter feature selection in detecting distributed denial-of-service attack
Published 2019Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
16
-
17
Mobile application for real time baby sign language recognition using YOLOv8 / Siti Aishah Idris and Ahmad Firdaus Ahmad Fadzil
Published 2024“…The model will be designed and developed using a deep learning algorithm, which is YOLOv8, the latest version of YOLO. …”
Get full text
Get full text
Get full text
Article -
18
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis -
19
Modified dynamic programming model with limited order picking capacity / Noraimi Azlin Mohd Nordin
Published 2021“…Next, to determine either Dijsktra’s algorithm or Dynamic Programming Method will give the most accurate shortest path and minimum travel time for order pickers. …”
Get full text
Get full text
Get full text
Thesis
