Search Results - (( java implementation during algorithm ) OR ( knowledge creating process algorithm ))

Refine Results
  1. 1

    Pairwise testing tools based on hill climbing algorithm (PTCA) by Lim, Seng Kee

    Published 2014
    “…The actual implementation of the algorithm which is in Java programming language, the program is implemented on Net Bean 7.0.1. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  2. 2

    Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization by Mohammad Ata, Karimeh Ibrahim

    Published 2019
    “…The circuits have been designed by proteus, the microcontrollers have been programmed by micro C, and the Graphical User Interface (GUI) has been implemented in Java. Few by electronic components such as RFID, multiplexer, XBee, and servo motors have been used to realize the system. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Cryptanalysis in cryptographic algorithm design by Z'aba, Muhammad Reza, Ahmad, Badrisham, Ibrahim, Subariah, Maarof, Mohd. Aizaini

    Published 2006
    “…The aim of this paper is to create awareness on the importance of cryptanalysis when designing cryptographic algorithms. …”
    Get full text
    Conference or Workshop Item
  4. 4

    Talkout : Protecting mental health application with a lightweight message encryption by Gavin Teo Juen

    Published 2022
    “…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  5. 5

    Online food ordering application using Boyer-Moore algorithm / Muhammad Zulhilmie Dzulkifli by Dzulkifli, Muhammad Zulhilmie

    Published 2021
    “…The main goal of this study is to create an online food ordering app using the corresponding Boyer-Moore string matching algorithm. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Design & Development of a Robotic System Using LEGO Mindstorm by Abd Manap, Nurulfajar, Md Salim, Sani Irwan, Haron, Nor Zaidi

    Published 2006
    “…The system is capable in operating an off-line programming method, starting from its programming sequences until robotic implementation of the program. During early stages, the research is emphasis more towards designing a robotic system using RoboLab software and C++ programming language. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    Data Hiding Techniques In Digital Images by Al Thloothi, Salah Ramadan

    Published 2003
    “…After all these studies, one of the algorithms in the masking technique is developed and implemented using JAVA program to embed message into true color image with a good quality and higher capacity. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Teaching students interdisciplinary knowledge through compilation of differential models within the framework of course projects / Duisebek Nurgabyl ... [et al.] by Nurgabyl, Duisebek, Zhailaubaeva, Nazgul, Abdoldinova, Gulsim, Kaidassov, Zhetkerbai

    Published 2023
    “…Data analysis revealed that 87% of students and 80% of teachers lacked knowledge and skills to create mathematical models and establish interdisciplinary connections. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    A Continuous Overlay Path Probing Algorithm For Overlay Networks by Feily, Maryam

    Published 2013
    “…However, the important issue is how to measure the available bandwidth on an end-to-end overlay path without prior knowledge about the physical network. Over the last two decades, researchers have been trying to create algorithms to measure end-to-end available bandwidth and other bandwidth-related metrics accurately, quickly, and without affecting the traffic of the path. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Machine learning using robust AI techniques / Prof. Madya Dr. Nordin Abu Bakar by Abu Bakar, Nordin (Prof. Madya Dr.)

    Published 2012
    “…maybe he learns from past experience or new information he receives. The learning process creates knowledge that guides a person to make the decisions. …”
    Get full text
    Get full text
    Research Reports
  11. 11

    Multi-floor indoor location estimation system based on wireless local area network by Chua, Tien Han

    Published 2007
    “…Before developing the system, study on characteristics of RSS is conducted to help the design, development and implementation of the proposed system. The proposed system is then designed and developed using Java programming language. …”
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13

    Utilizing Classifier Algorithms to Analyze Lending Activity at The Sumsel Babel Bank's Pagar Alam Branch by Muhammad, Ichsan, Tri Basuki, Kurniawan

    Published 2023
    “…In this research, a classifier algorithm was applied to create a prediction model to predict the customer before the lending application was used and process to pass the lending process in Bank Sumsel, branch Pagar Alam. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Adaptive firefly algorithm for hierarchical text clustering by Mohammed, Athraa Jasim

    Published 2016
    “…As search engine operates on Internet content that is constantly being updated, there is a need for a clustering algorithm that offers automatic grouping of items without prior knowledge on the collection. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system by Beg, Abul Hashem

    Published 2011
    “…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Ciphercrypt-an Encryption System / Nor Hidayah Ngah by Nor Hidayah, Ngah

    Published 2004
    “…The hashed keyword will be used in encrypt / decrypt process by using any of 3 encryption algorithm mentioned before. …”
    Get full text
    Get full text
    Thesis
  17. 17

    An online density-based clustering algorithm for data stream based on local optimal radius and cluster pruning by Islam, Md Kamrul

    Published 2019
    “…Experimental results are compared with other alternative online/offline hybrid density-based clustering algorithms. The average processing time for data point in the data stream is about 2 milliseconds which is much lower than the aligned clustering algorithms in literature. …”
    Get full text
    Get full text
    Thesis
  18. 18

    A novel association rule mining approach using TID intermediate itemset by Aqra, Iyad, Herawan, Tutut, Ghani, Norjihan Abdul, Akhunzada, Adnan, Ali, Akhtar, Bin Razali, Ramdan, Ilahi, Manzoor, Raymond Choo, Kim-Kwang

    Published 2018
    “…Designing an efficient association rule mining (ARM) algorithm for multilevel knowledge-based transactional databases that is appropriate for real-world deployments is of paramount concern. …”
    Get full text
    Get full text
    Article
  19. 19

    Medical sign language translator in healthcare facility using yolo version 7 algorithm / Nurin Qistina Zaini by Zaini, Nurin Qistina

    Published 2023
    “…The system will begin to function by receiving real-time input of a sign language image. The YOLOv7 algorithm will process the image by detecting trained images in the input image. …”
    Get full text
    Get full text
    Thesis
  20. 20