Search Results - (( java implementation tree algorithm ) OR ( programming practice mobile algorithm ))

Refine Results
  1. 1

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde by Ogunfolajin Maruff , Tunde

    Published 2022
    “…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization by Mohammad Ata, Karimeh Ibrahim

    Published 2019
    “…This study proposes a car parking management system which applies Dijkstra’s algorithm, Ant Colony Optimization (ACO) and Binary Search Tree (BST) in structuring a guidance system for indoor parking. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Analysis the components of SNOW 3G and ZUC ciphers in mobile systems by Jassim, Khalid Fadhil, Alshaikhli, Imad Fakhri Taha

    Published 2018
    “…The SNOW 3G and ZUC ciphers algorithms are classified as stream ciphers, used as confidentiality algorithms in third and fourth generations of Mobile Technologies (3G-UMTS and 4G- LTE). …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Personal mobile-health application by Lim, Jeremy Yeu Shuo

    Published 2025
    “…The proposed mobile health application will be considered about user engagement and motivation of using the application which provides user engagement features like chatbot as personal health assistant to increase user engagement and motivation by achieve healthy lifestyle practice. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  6. 6

    The implementation of forward chaining algorithm in calculating inheritance property based on faraid law / Nur Ain Syafiqah Mohammad Marzuki by Mohammad Marzuki, Nur Ain Syafiqah

    Published 2021
    “…The distribution of properties is solved using Python Programming Language and also will verify using Inheritance Calculator Mobile Application. …”
    Get full text
    Get full text
    Student Project
  7. 7

    Development of a Wireless PC-Controlled Mobile Robot System and Multimedia Based Learning Module by Mujber, Tariq Saad

    Published 2001
    “…The code has been developed using Object-Oriented Programming Language and Graphic User Interface. The developed control algorithms enable the user to control the mobile robot manually, automatically or by voice recognition commands. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Back propagation neural network approach for churn prediction: a case study in Celcom (M) Berhad / Hapida Husin by Husin, Hapida

    Published 2008
    “…The data has been chunk into a few series to determine the significant variables for predicting churn. Computer program were written in Matlab to implement the training and testing programs for the ANN algorithms. …”
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10
  11. 11

    Developing Android Application To Guide Lean Six Sigma PDCA Project by Ong, Sin Joo

    Published 2018
    “…Improvements were made accordingly. As the practical contribution, the work produces a ready to use mobile application to help practitioners in particular those in the industry at the early stage of lean journey. …”
    Get full text
    Get full text
    Monograph
  12. 12
  13. 13

    Enhancing navigation accuracy of Turtlebot3 Burger mobile robot by Muhammad Haniff, Gusrial, Muhammad Luqman Hakim, Abdullah, Nur Aqilah, Othman, Hamzah, Ahmad

    Published 2024
    “…To address this challenge, the Kalman Filter algorithm is implemented in this robot, as it is widely used for mobile robot navigation and system integration. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14

    Performance comparison of MVDR and LCMV beamforming algorithm in 2.3 GHz adaptive antenna system by Salem B., Tiong S.K., Koh S.P., Hock G.C.

    Published 2023
    “…This paper presents two methods of beamforming algorithm; Minimum Variance Distortionless Response (MVDR) and Linear Constraint Minimum Variance (LCMV). …”
    Article
  15. 15

    Digital diversification to expand the Indonesian radio industry: A Case Study of PRFM, Delta, and Dahlia Stations by Septiawan Santana Kurnia, Firmansyah, Dadi Ahmadi, Doddy Iskandar Cakranegara, Satya Indra Karsa, Erwin Kustiman

    Published 2023
    “…How the radio broadcasting business is accessible to audiences, fun and mobile: pocketable, openable on mobile phones, computers, iPads and more? …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    My little learner: E-learning wonderland by Teoh, Wei En

    Published 2025
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  17. 17

    Development of oil palm fresh fruit bunch maturity assessment software for personal digital assistant by Kavandi, Nader

    Published 2011
    “…Both of the mentioned key technologies are already available in any modern Personal Digital Assistant (PDA), nominating them as capable, programmable and ultra-mobile devices in this field. The main objective of this research was to develop a software program that enables a regular PDA to replace a conventional camera vision system used for maturity inspection of oil palm fresh fruit bunches. …”
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…Obfuscation (Obfu) is a practice to make the programming code complicated to protect the Intellectual Property (IP) and prevent prohibited software Reverse Engineering (RE). …”
    Get full text
    Get full text
    Thesis
  20. 20

    Designing machine learning frameworks for intelligence and gamification research / Nordin Abu Bakar by Abu Bakar, Nordin

    Published 2016
    “…The central part of this subject is described in terms of frameworks or algorithms that explains how to achieve better performance. …”
    Get full text
    Get full text
    Thesis