Search Results - (( java implementation during algorithm ) OR ( knowledge implication based algorithm ))

Refine Results
  1. 1

    Pairwise testing tools based on hill climbing algorithm (PTCA) by Lim, Seng Kee

    Published 2014
    “…The actual implementation of the algorithm which is in Java programming language, the program is implemented on Net Bean 7.0.1. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  2. 2

    Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization by Mohammad Ata, Karimeh Ibrahim

    Published 2019
    “…The circuits have been designed by proteus, the microcontrollers have been programmed by micro C, and the Graphical User Interface (GUI) has been implemented in Java. Few by electronic components such as RFID, multiplexer, XBee, and servo motors have been used to realize the system. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Talkout : Protecting mental health application with a lightweight message encryption by Gavin Teo Juen

    Published 2022
    “…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  4. 4

    Design & Development of a Robotic System Using LEGO Mindstorm by Abd Manap, Nurulfajar, Md Salim, Sani Irwan, Haron, Nor Zaidi

    Published 2006
    “…The system is capable in operating an off-line programming method, starting from its programming sequences until robotic implementation of the program. During early stages, the research is emphasis more towards designing a robotic system using RoboLab software and C++ programming language. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Agreement options for negotiation on material location decision of housing development by Utomo, C., Rahmawati, Y.

    Published 2020
    “…Social implications: The satisficing algorithm of the coalition will satisfy all stakeholders. …”
    Get full text
    Get full text
    Article
  6. 6

    Data Hiding Techniques In Digital Images by Al Thloothi, Salah Ramadan

    Published 2003
    “…After all these studies, one of the algorithms in the masking technique is developed and implemented using JAVA program to embed message into true color image with a good quality and higher capacity. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Multi-floor indoor location estimation system based on wireless local area network by Chua, Tien Han

    Published 2007
    “…Before developing the system, study on characteristics of RSS is conducted to help the design, development and implementation of the proposed system. The proposed system is then designed and developed using Java programming language. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system by Beg, Abul Hashem

    Published 2011
    “…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Rabbit breed classification using CNN / Aishah Nabila Mohd Zaid by Mohd Zaid, Aishah Nabila

    Published 2024
    “…This project aims to study the CNN algorithm's efficacy in rabbit breed classification, develop a CNN-based prototype, and evaluate its accuracy. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Organizational Culture Automated Audit System (OCAAS) by Al - Jubair, Md. Abdullah

    Published 2017
    “…The study suggests the development of data mining based on knowledge management technology that can be utilized in automated OCA to overcome the many drawbacks. …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    Determinants to knowledge transfer and sharing in multimedia super corridor in Malaysia : the mediating role of trust by Meddour, Houcine

    Published 2016
    “…Based on knowledge creation theory, this study examines the determinants of knowledge transfer and sharing in MSC status organizations in Malaysia. …”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    A malware analysis and detection system for mobile devices / Ali Feizollah by Ali, Feizollah

    Published 2017
    “…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    Human activity recognition via accelerometer and gyro sensors by Tee, Jia Lin

    Published 2023
    “…To prevent overfitting, early stopping is used to monitor validation loss during training and dropout rate of 0.3 are applied. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  14. 14

    Application of machine learning and artificial intelligence in detecting SQL injection attacks by Md Sultan, Abu Bakar, Agiliga, Nwabudike Augustine, Osman, Mohd Hafeez Bin, Sharif, Khaironi Yatim

    Published 2024
    “…The main aim of this work is focusing on solving the IT-related challenge lack-of-adequate knowledge bases and tools for security practitioners to monitor and mitigate SQL Injection attacks with AI/ML techniques. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Manufacturing process planning optimisation in reconfigurable multiple parts flow lines by Ismail, Napsiah, Musharavati, Farayi, Hamouda, Abdel Magid Salem, Ramli, Abdul Rahman

    Published 2008
    “…Design/methodology/approach: The genetic algorithm methodology implements a genetic algorithm that is augmented by application specific heuristics in order to guide the search for an optimal solution. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Application Of Bibliometric Analysis on Root Growth Algorithm by Tengku Malim Busu, Tengku Nurul Aimi Balqis, Ahmad Kamaruddin, Saadi, Ahad, Nor Aishah, Md Ghani, Nor Azura, Hamid, Hashibah

    Published 2024
    “…An article reviewed and analyzed bibliographic data on metaheuristics but is not specific on the topic of root growth algorithm. Therefore, this article presents a bibliometric analysis based on the topic of the root growth algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    KopiCulture: Unveiling Customer Loyalty in Malaysia's Coffee Market through Clustering Algorithms for Local Cafe Insights by Tuan Norhafizah, Tuan Zakaria, Che Ku Nuraini, Che Ku Mohd

    Published 2024
    “…Through this analysis, we contribute to the expanding body of knowledge on customer loyalty in the context of the Malaysian coffee market and offer implications for coffee retailers seeking to thrive in this competitive environment.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  18. 18
  19. 19

    Does organizational culture matter in the relationship between trust and SMEs performance by Gorondutse, Abdullahi Hassan, Abdullah, Haim Hilman

    Published 2018
    “…Research limitations/implications – The study used perceptions of owner/managers and only small-scale industries. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Risk assessment for safety and health algorithm for building construction in Oman by Al-Anbari, Saud Said

    Published 2015
    “…Existing risk matrices are designed based on brainstorming sessions, which may make these matrices risky to use because such sessions are based mainly on experience and knowledge about the decision at hand. …”
    Get full text
    Get full text
    Thesis