Search Results - (( java implementation modified algorithm ) OR ( programming program writing algorithm ))
Search alternatives:
- implementation modified »
- java implementation »
- programming program »
- writing algorithm »
- program writing »
-
1
Challenges of hidden data in the unused area two within executable files
Published 2009“…The designed algorithms were intended to help in proposed system aim to hide and retract information (data file) with in unused area 2 of any execution file(exe.file). …”
Get full text
Get full text
Get full text
Article -
2
CSC126 - Fundamentals of Algorithms and Computer Problem Solving / Faculty of Computer And Mathematical Sciences
Published 2023“…This course is an introduction to problem solving using a computer programming language. It emphasizes on algorithm development and writing computer programs, as well as common good practices in writing programs. …”
Get full text
Get full text
Get full text
Teaching Resource -
3
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
4
Algorithm As A Problem Solving Technique For Teaching And Learning Of The Malay Language
Published 2019“…The students were to arrange the basic words into grammatical sentences based on the scratch program and write a cake recipe using an algorithmic technique, a series of instructions contained in the scratch program. …”
Get full text
Get full text
Get full text
Article -
5
Algorithm as a problem solving technique for teaching and learning of the Malay language
Published 2019“…The students were to arrange the basic words into grammatical sentences based on the scratch program and write a cake recipe using an algorithmic technique, a series of instructions contained in the scratch program. …”
Get full text
Get full text
Get full text
Proceeding Paper -
6
Algorithm as a problem solving technique for teaching and learning of the Malay language
Published 2019“…The students were to arrange the basic words into grammatical sentences based on the scratch program and write a cake recipe using an algorithmic technique, a series of instructions contained in the scratch program. …”
Get full text
Get full text
Get full text
Article -
7
Analyzing students’ experience in programming with computational thinking through competitive, physical, and tactile games: The quadrilateral method approach
Published 2021“…The CT elements in this research focus on four major programming concepts, which are decomposition, pattern recognition, abstraction, and algorithmic thinking. …”
Get full text
Get full text
Get full text
Article -
8
Genetic algorithm based for optimizing filter design / Rohana Awang Ahmed
Published 2000“…The conventional filter design technique is adapted in writing a MATLAB program using the Signal Processing Toolbox. …”
Get full text
Get full text
Thesis -
9
OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT
Published 2023“…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
Review -
10
Vision-based robot indoor navigation
Published 2022“…NodeRed links both processing units together. An algorithm is developed in the computer to achieve image processing, user input, path planning, simulation, and writing of output files. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
11
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
Get full text
Get full text
Thesis -
12
Pattern extraction for programming performance evaluation using directed apriori
Published 2009“…Computer programming is taught as a core subject in Information Technology related studies.It is one of the most essential skills which each student has to acquire.However, there is still a small number of students who are unable to write a program well. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
13
Enhancing programming language learning with 3D game-based programming for MSU students: codadventure / Abdullah Adib Aditia Wirawan and Nur Suhana Mohd Redzo
Published 2024“…The students face challenges while learning programming languages and memorizing programming concepts. …”
Get full text
Get full text
Conference or Workshop Item -
14
An investigation into influence factor of student programming grade using association rule mining
Published 2010“…Computer programming is one of the most essential skills which each graduate has to acquire.However, there are reports that they are unable to write a program well. …”
Get full text
Get full text
Get full text
Article -
15
Automatic generation of content security policy to mitigate cross site scripting
Published 2016“…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
Get full text
Get full text
Conference or Workshop Item -
16
Fault detection with optimum March Test Algorithm
Published 2012“…This paper analyzes MATS++(6N), March C-(10N), March SR(14N), and March CL(12N) test algorithms and shows that they cannot detect either Write Disturb Faults (WDFs) or Deceptive Read Destructive Faults (DRDFs) or both. …”
Get full text
Conference or Workshop Item -
17
Encrypted mobile messaging application using AES block cipher cryptography algorithm / Nur Rasyiqah Zulkifli
Published 2019“…The programming language that is used to write the program is Java Language that will run on android phones. …”
Get full text
Get full text
Student Project -
18
Practical cryptography: algorithms and implementations using C++
Published 2014“…Some books that include cryptographic algorithms with practical programming codes are by this time (i.e., at the preparation of this book) outdated. …”
Get full text
Get full text
Get full text
Get full text
Book -
19
A STUDY OF PROTECTION SYSTEM TO IMPROVE POWER SYSTEM RELIABILITY USING ATP (ALTERNATIVE TRANSIENT PROGRAM)
Published 2007“…The 'feedback' is a trip signal which will be sent to the circuit breaker to open or reclose. The algorithm of the relay are designed by writing specific code using the MODELS language. …”
Get full text
Get full text
Final Year Project -
20
Artex 2019 Earthscape
Published 2019“…Synopsis of Artwork Are computer codes and algorithms art? Is programming considered an expressive language just like other art forms? …”
Get full text
Get full text
Picture
