Search Results - (( java implementation 5s algorithm ) OR ( system implementation challenges algorithm ))
Search alternatives:
- system implementation »
- challenges algorithm »
- java implementation »
- implementation 5s »
- 5s algorithm »
-
1
Challenges of hidden data in the unused area two within executable files
Published 2009“…Results: The programs were coded in Java computer language and implemented on Pentium PC. The designed algorithms were intended to help in proposed system aim to hide and retract information (data file) with in unused area 2 of any execution file(exe.file). …”
Get full text
Get full text
Get full text
Article -
2
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis -
3
An Agent-Based System with Personalization and Intelligent Assistance Services for Facilitating Knowledge Sharing
Published 2006“…As response to these challenges, this study is dedicated to approach knowledge sharing facilitation with an agent-based system. …”
Get full text
Get full text
Thesis -
4
Performance evaluation of real-time multiprocessor scheduling algorithms
Published 2016Get full text
Get full text
Conference or Workshop Item -
5
-
6
-
7
-
8
-
9
Parallel distributed genetic algorithm development based on microcontrollers framework
Published 2023Conference paper -
10
-
11
CAR TRACTION CONTROL SYSTEM
Published 2007“…This project explores the potential of implementing fuzzy logic algorithm for traction control system using VHDL. …”
Get full text
Get full text
Final Year Project -
12
-
13
Hybrid MPPT algorithm for mismatch photovoltaic panel application / Muhammad Iqbal Mohd Zakki
Published 2019“…Closed-loop PID control system is implemented to optimize the control speed, and accuracy of the MPPT system, along with PSO-based auto-tuning algorithm dedicated for the PID controller to provide adaptability with diverse hardware setup. …”
Get full text
Get full text
Thesis -
14
Smart appointment organizer for mobile application / Mohd Syafiq Adam
Published 2009“…In creating this application, NetBeans IDE 6.5and Java Micro Edition (Java ME) are used. This application can be installing into the mobile phone.…”
Get full text
Get full text
Thesis -
15
IMPLEMENTATION OF CONTROL ALGORITHMS IN BALL MAGNETIC LEVITATION SYSTEM TO IMPROVE SYSTEM PARAMETERS
Published 2012Get full text
Get full text
Final Year Project -
16
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…The support vector machines (SVM) algorithm obtained the overall best results of 94.5% accuracy, 91.8% precision, 91.7% recall, and 91.1% f-Measure while the naïve bayes (NB) algorithm obtained the best AUC score of 0.944 with the tweet data of Dato Seri Anwar. …”
Get full text
Get full text
Get full text
Thesis -
17
Acceleration of Retinex Algorithm for Image Processing on Android Device Using Renderscript
Published 2013“…This is a challenge because of limited computational power and memory of the portable system. …”
Get full text
Get full text
Conference or Workshop Item -
18
Cryptanalysis of elliptic curve scalar multiplication algorithms
Published 2025“…This creates challenges in developing secure Elliptic Curve Cryptography systems and performing cryptanalysis for scalar multiplication algorithms. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
19
A collaborative filtering recommender system for infrequently purchased product using slope-one algorithm and association rule mining
Published 2015“…This recommender system uses slope-one algorithm whereby it accumulate and takes into account of the difference in popularity. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
20
Development Of Control Algorithm For Spot Cooling System
Published 2017“…This project’s aim is to develop a Control Algorithm for Spot Cooling system. The system helps to detect and track a non-human decoy. …”
Get full text
Get full text
Monograph
