Search Results - (( java data normalization algorithm ) OR ( program virtualization design algorithm ))

  • Showing 1 - 19 results of 19
Refine Results
  1. 1

    Virtual reality in algorithm programming course: practicality and implications for college students by Dewi, Ika Parma, Ambiyar, Mursyida, Lativa, Effendi, Hansi, Giatman, Muhammad, Efrizon, Hanafi, Hafizul Fahri, Ali, Siti Khadijah

    Published 2024
    “…The reliability of VR supports various variations in learning, including learning programming algorithms. This research aims to design and develop VR in learning programming algorithms. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly by Zulkifly, Ahmad Zuladzlan

    Published 2019
    “…Even a normal people using clustering to grouping their data. …”
    Get full text
    Get full text
    Thesis
  3. 3

    REDUCING LATENCY IN A VIRTUAL REALITY-BASED TRAINING APPLICATION by P ISKANDAR, YULITA HANUM

    Published 2006
    “…Findings indicated that heuristic-based algorithm is an accurate prediction method to compensate latency in virtual training. …”
    Get full text
    Get full text
    Thesis
  4. 4

    SANAsms: Secure short messaging system for secure GSM mobile communication by Anuar, N.B., Azlan, I.M., Wahid, A.W.A., Zakaria, O.

    Published 2008
    “…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5
  6. 6

    Cognitive benefits of employing multiple AI voices as specialist virtual tutors in a multimedia learning environment by Liew, Tze Wei, Tan, Su Mae, Chan, Tak Jie, Tian, Yang, Ahmad, Faizan

    Published 2025
    “…To address this gap, we draw on multimedia learning and cognitive models to investigate the effects of using multiple AI voices as specialist virtual tutors for distinct programming algorithm subtopics on cognitive load and learning outcomes. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Electing the best set of features will help to improve the classifier predictions in terms of the normal and abnormal pattern. The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Implementation of repetitive control algorithm in reducing vibration using MATLAB/SIMULINK / Mohamad Zuhairy Mohamed by Mohamed, Mohamad Zuhairy

    Published 2008
    “…MATLAB programming is sue to design the repetitive controller after that its implement to the SIMULINK software. …”
    Get full text
    Get full text
    Student Project
  9. 9

    Development of virtual control panel for single spindle configuration 2-axis filament winding machine(SSFWM) by Vicneswaran, Kuppusamy

    Published 2009
    “…In the software system, algorithms are designed to perform calculation for mathematical equation of fiber density, fiber width and product to calculate the optimal machine configuration such as number of running, velocities rotation of mandrel, velocities of carriage moment and angle of rotation. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  10. 10

    Development of capability-based virtual cellular manufacturing systems in dual-resource constrained settings over semi-distributed layouts by Hamedi, Maryam

    Published 2012
    “…Virtual Cellular Manufacturing Systems (VCMSs) as a highly flexible manufacturing concept have been designed to improve the performance of classical Cellular Manufacturing Systems (CMSs) and job shop manufacturing environments by creating virtual grouping resources. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Challenges of hidden data in the unused area two within executable files by Naji, Ahmed Wathik, Zaidan, A.A., Zaidan, B.B.

    Published 2009
    “…The designed algorithms were intended to help in proposed system aim to hide and retract information (data file) with in unused area 2 of any execution file(exe.file). …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12
  13. 13
  14. 14

    IoT based IMU sensor network for human arm pose estimation / Jahangir Hassan Khan by Jahangir , Hassan Khan

    Published 2019
    “…The Forward Kinematics approach has great advantage such as being easy to program and its faster computational speed, as compared to the conventional arm pose estimation algorithms. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Anfis Modelling On Diabetic Ketoacidosis For Unrestricted Food Intake Conditions by Saraswati, Galuh Wilujeng

    Published 2017
    “…Two sets of experimental data involving 20 diabetic patients and 20 healthy subjects were collected from CITO laboratory Semarang Central Java, Indonesia. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17
  18. 18
  19. 19