Search Results - (( java implementation phase algorithm ) OR ( programming using store algorithm ))

Refine Results
  1. 1

    Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly by Zulkifly, Ahmad Zuladzlan

    Published 2019
    “…All the algorithm for the engine has been developed by using Java script language. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Classification of Google Play application using decision tree algorithm on sentiment analysis of text reviews / Aqil Khairy Hamsani, Ummu Fatihah Mohd Bahrin and Wan Dorishah Wan A... by Hamsani, Aqil Khairy, Mohd Bahrin, Ummu Fatihah, Wan Abdul Manan, Wan Dorishah

    Published 2023
    “…The project's objectives are to study the classifying approach of Google Play Store application reviews using the Decision Tree algorithm, develop a prototype of a classifying application program, and evaluate the accuracy model of the review classification program. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Optimal route checking using genetic algorithm for UiTM's bus services / Tengku Salman Fathi Tengku Jaafar by Tengku Jaafar, Tengku Salman Fathi

    Published 2006
    “…Although from human logical thinking, the route can be generated easily but the calculation of checking the route whether it is optimal route or not is difficult and will take long time to be implemented. This research study with the development of the Optimal Route Checking Using Genetic Algorithm system should solve this scenario. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Image classification using two dimensional wavelet coefficients with parallel computing by Ong, Yew Fai

    Published 2020
    “…In addition, this research does not require any pre-stored database to train the algorithm. This research requires the supervision from the users to train the algorithm by naming the region. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  5. 5

    Movie recommendation system / Najwa Syamimie Hasnu by Hasnu, Najwa Syamimie

    Published 2020
    “…The algorithm chosen was implemented using Java Programming language and was tested using Root Means Square Error (RMSE) formula.…”
    Get full text
    Get full text
    Thesis
  6. 6

    Songs Search Using Human Humming Voice by Abdul Rahman, Mohamad Ariff

    Published 2007
    “…The system is developed to find songs stored in the database using human humming voice, whereby a sample of the humming voice is compared to songs stored in the system. …”
    Get full text
    Get full text
    Final Year Project
  7. 7

    Implementing frequency translation by adapting digital phase shifter for WCDMA using XILINX: article by Zakaria, Mohd Khalili

    Published 2009
    “…Algorithm of the design will be written in VHDL programming Language which then simulated through Modelsim SE 6.3f. …”
    Get full text
    Get full text
    Article
  8. 8

    Encrypted mobile messaging application using AES block cipher cryptography algorithm / Nur Rasyiqah Zulkifli by Zulkifli, Nur Rasyiqah

    Published 2019
    “…The programming language that is used to write the program is Java Language that will run on android phones. …”
    Get full text
    Get full text
    Student Project
  9. 9

    Implementation frequency translation by adapting digital phase shifter for WCDMA using XILINX by Zakaria, Mohd Khalili

    Published 2009
    “…Algorithm of the design will be written in VHDL programming Language which then simulated through Modelsim SE 6.3f. …”
    Get full text
    Get full text
    Student Project
  10. 10

    Final exam question paper data encryption and decryption using advance encryption standard / Khairul Nashran Nazari by Nazari, Khairul Nashran

    Published 2017
    “…The results from this research have proved that the AES is very effective in terms of time taken to encrypt and decrypt documents, strength of the algorithm and the reliability of the program. It is recommended that Final Examination Question Papers be enhanced using Encryptor Application by applying AES on a different domain to further strengthen information security.…”
    Get full text
    Get full text
    Thesis
  11. 11

    Genetic algorithm based mass distribution optimization of quadruped leg robot for walking performance enhancement by Loo, Shing Yan

    Published 2013
    “…Passive compliance mechanism that currently adopted in legged robot such as spring-damper mechanisms, flexible links and components, and adjustable joint stiffness are used to store and release the impact from the environment. …”
    Get full text
    Get full text
    Thesis
  12. 12

    A network based fetal ECG monitoring algorithm by Ibrahimy, Muhammad Ibn, Hasan , M. A., Motakabber, S. M. A.

    Published 2011
    “…The hardware data acquisition system acquires the mother’s AECG data by using a commercial ECG frontend microchip, called CARDIC and stores the data in a local computer terminal. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13
  14. 14

    Hybrid cryptography algorithm to improve security cloud storage by Abd Almohsen, Inam Razzaq

    Published 2017
    “…It is not done only by encrypting it but also providing access to the data only on successful authentication. ECC, AES, and RSA algorithms will be used to encrypt the files to enhance security data on the cloud storage. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16

    The winning percentage in congkak using a randomised strategy by Chuei, Yee Chen, Ismail, Shahrina, Lim, Fong Peng, Yow, Kai Siong

    Published 2022
    “…We model the route for each player in congkak using a directed graph and adopt these graph representations in our programs, to compute the winning percentage of each player. …”
    Get full text
    Get full text
    Article
  17. 17

    Examination timetable scheduling system (ETSS) / Fong Teng Heng by Fong, Teng Heng

    Published 2000
    “…ETSS uses Visual Basic 6.0 as a programming language. …”
    Get full text
    Get full text
    Thesis
  18. 18

    A New Mobile Botnet Classification based on Permission and API Calls by Yusof, M, Saudi, MM, Ridzuan, F

    Published 2024
    “…As a result, 16 permissions and 31 API calls that are most related with mobile botnet have been extracted using feature selection and later classified and tested using machine learning algorithms. …”
    Proceedings Paper
  19. 19

    Mapreduce algorithm for weather dataset by Khalid Adam, Ismail Hammad

    Published 2017
    “…This original dataset is stored in Hadoop Distributed File System. Next, MapReduce Algorithm is developed using Java programming. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Photo Based Walkthrough Using Prefetch and Caching Strategies by Yew, Kwang Hooi, Lai , Chan Yet, Nordin, Zakaria

    Published 2007
    “…This research was carried out by creating an IBR prototype using OpenGL and C++ programming language. A large amount of digital photographs were captured and stored in a secondary storage. …”
    Get full text
    Get full text
    Conference or Workshop Item