Search Results - (( java implementation using algorithm ) OR ( program game program algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3

    Analyzing students’ experience in programming with computational thinking through competitive, physical, and tactile games: The quadrilateral method approach by Habib, M. A. a, Raja-Yusof, R. -J., Salim, S. S.a, Sani, A. A. a, Sofian, H., Abu Bakar, A.

    Published 2021
    “…We have conducted game activities through several algorithms that include sorting, swapping, and graph algorithms and analyzed how the game affects the student experience (SX) in understanding the CT concept in those algorithms. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Enhancing understanding of programming concepts through physical games by Raja Yusof, Raja Jamilah, Habib, Ahsan

    Published 2017
    “…We produced in total 10 lesson games to illustrate variables, swapping, arrays, sorting algorithm particularly bubble sort, quicksort, selection sort, graph theory, dynamic programming, amortized analysis and trees. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    A Systematic Exploration of Mutation Space in a Hybridized Interactive Evolutionary Programming for Mobile Game Programming by Jia Hui Ong, Jason Teo

    Published 2014
    “…Evolutionary programming is the core Evolutionary Algorithm (EA) used in this study where it is hybridized with Interactive Evolutionary Algorithm (IEA) to generate different rulesets that was played on a custom arcade-type mobile game. …”
    Get full text
    Get full text
    Article
  6. 6
  7. 7

    Enhancing programming language learning with 3D game-based programming for MSU students: codadventure / Abdullah Adib Aditia Wirawan and Nur Suhana Mohd Redzo by Aditia Wirawan, Abdullah Adib, Mohd Redzo, Nur Suhana

    Published 2024
    “…This study focuses on innovative approaches to enhance the learning experiences of programming languages, focusing on developing 3D game-based programming for students at Management & Science University (MSU). …”
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    The solution of 2048 puzzle game using A* algorithm / Zafhira Ismail by Ismail, Zafhira

    Published 2017
    “…Experiment result proves high accuracy and efficiency from the proposed algorithm. For future work, besides the program providing the shortest path to minimize the possible movement to achieve game’s goal, the game could have a hint button attached to help the player.…”
    Get full text
    Get full text
    Thesis
  9. 9

    Computer algorithm for playing checkers by Chua Shin Lee

    Published 2023
    “…The Checkers game is programmed using Visual C++. Two players can play the game or against the computer The Al algorithm will select the best path to win when playing against the human. …”
    text::Thesis
  10. 10

    Modeling a problem solving approach through computational thinking for teaching programming / Zebel Al Tareq by Zebel , Al Tareq

    Published 2021
    “…An experimental study was designed to evaluate the PSA model. The syntax-based programming workshop was the control group. The problem-based and the game-based programming workshops utilizing our problem-solving model using sorting algorithms were the experimental groups. …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12

    Automated synthesis of mobile game environments and rulesets using a hybridized interactive evolutionary programming approach by Jia, Hui Ong, Teo, Jason Tze Wi

    Published 2014
    “…By hybridizing Evolutionary Programming (EP) with Interactive Evolutionary Algorithm (IEA), game rules and its playing environment will be automatically generated for an arcade-type game that can be played on the Android mobile platform. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  14. 14
  15. 15

    Provider independent cryptographic tools by Ibrahim, Subariah, Salleh, Mazleena, Abdul Aziz, Shah Rizan

    Published 2003
    “…The library is implemented by using Java cryptographic service provider framework that conforms to Java Cryptographic Architecture (JCA) and Java Cryptographic Extension (JCE). …”
    Get full text
    Get full text
    Get full text
    Monograph
  16. 16
  17. 17

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    Self-evaluation of RTS Troop's performance by Chin Kim On, Chang Kee Tong, Jason Teo, Rayner Alfred, Wang Cheng, Tan Tse Guan

    Published 2015
    “…This paper demonstrates the research results obtained from a comparison of Evolutionary Programming (EP) and hybrid Differential Evolution (DE) and Feed Forward Neural Network (FFNN) algorithms in the Real Time Strategy (RTS) computer game, namely Warcraft III. …”
    Get full text
    Non-Indexed Article
  20. 20

    Performance evaluation of real-time multiprocessor scheduling algorithms by Alhussian, H., Zakaria, N., Abdulkadir, S.J., Fageeri, S.O.

    Published 2016
    “…We hyave used the CPU profiler of Oracle JavaTM VisualVM to monitor the execution of LRE-TL as well as USG algorithms. …”
    Get full text
    Get full text
    Conference or Workshop Item