Search Results - (( java implementation 5s algorithm ) OR ( programming code application algorithm ))
Search alternatives:
- application algorithm »
- java implementation »
- implementation 5s »
- programming code »
- code application »
- 5s algorithm »
-
1
-
2
Performance evaluation of real-time multiprocessor scheduling algorithms
Published 2016Get full text
Get full text
Conference or Workshop Item -
3
Automatic marking system for programming subject
Published 2023“…This project is a web application designed for lecturer that teaching programming subject to automatically mark programming algorithm exercise. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
4
Simulation of shortest path using a-star algorithm / Nurul Hani Nortaja
Published 2004“…As for WXES3l82, the thesis cover the development of programming code, the code implementation and testing and the evaluation including discussion about the problem/constraints meed in the coding program development. …”
Get full text
Get full text
Thesis -
5
Reusability techniques in load-flow analysis computer program
Published 2004“…Adding and changing codes and algorithm of the software can be done without affecting much the existing codes and algorithms. …”
Get full text
Get full text
Article -
6
-
7
-
8
-
9
-
10
-
11
-
12
-
13
Parallel distributed genetic algorithm development based on microcontrollers framework
Published 2023Conference paper -
14
Optimization of blood vessel detection in retina images using multithreading and native code for portable devices
Published 2013Get full text
Get full text
Conference or Workshop Item -
15
Development of a cost efficient vision system for defects detection / Muhammad Zarif Kamarudin
Published 2010“…This need to be done due to the fact that further improvement of this project will need the coding history on how the algorithm being developed thus documentation is the common practice in programming stage. …”
Get full text
Get full text
Monograph -
16
-
17
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…Obfuscation involves transforming potentially revealing data, renaming useful classes and variables (identifiers) names to meaningless labels or adding unused or meaningless code to an application binary. Obfuscation is used to convert source code into a program that works the same way but is much harder to read and understand. …”
Get full text
Get full text
Thesis -
18
Smart appointment organizer for mobile application / Mohd Syafiq Adam
Published 2009“…In creating this application, NetBeans IDE 6.5and Java Micro Edition (Java ME) are used. This application can be installing into the mobile phone.…”
Get full text
Get full text
Thesis -
19
Development of cost efficient vision system for defects detection / Muhammad Zarif Kamarudin
Published 2010“…This need to be done due to the fact that further improvement of this project will need the coding history on how the algorithm being developed thus documentation is the common practice in programming stage. …”
Get full text
Get full text
Thesis -
20
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…The support vector machines (SVM) algorithm obtained the overall best results of 94.5% accuracy, 91.8% precision, 91.7% recall, and 91.1% f-Measure while the naïve bayes (NB) algorithm obtained the best AUC score of 0.944 with the tweet data of Dato Seri Anwar. …”
Get full text
Get full text
Get full text
Thesis
