Search Results - (( java implication based algorithm ) OR ( program integration role algorithm ))

Refine Results
  1. 1

    Algorithm-program visualization model : An intergrated software visualzation to support novices' programming comprehension by Affandy

    Published 2015
    “…Taking into account from those main issues, this study introduces the new model of integrated algorithm-program visualization (ALPROV) for developing program comprehension tool. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3

    Using simulated annealing algorithm for optimization of quay cranes and automated guided vehicles scheduling by Homayouni, Seyed Mahdi, Tang, Sai Hong, Ismail, Napsiah, Mohd Ariffin, Mohd Khairol Anuar

    Published 2011
    “…In this paper, an integrated scheduling of quay cranes and automated guided vehicles is formulated as a mixed integer linear programming model. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4
  5. 5

    AI recommendation penetration testing tool for cross-site scripting: support vector machine algorithm by Salim, Nur Saadah, Saad, Shahadan

    Published 2025
    “…This research introduces a new approach to enhancing cybersecurity by integrating Support Vector Machine (SVM) algorithms with penetration testing to develop a recommendation system focused on Cross-Site Scripting (XSS) attack detection. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    'Chapter 7: Smartphone penetration test: Securing Industry 5.0 mobile applications' in "1st Edition, The Future of Human-Computer Integration Industry 5.0 Technology, Tools, and Al... by Eka Wahyu, Aditya, Nur Haryani, Zakaria, Fazli, Azzali, Mohamad Nazim, Jambli

    Published 2024
    “…The Future of Human-Computer Integration: Industry 5.0 Technology, Tools, and Algorithms provides a valuable insight into how Industry 5.0 technologies, tools, and algorithms can revolutionise industries and drive innovation. …”
    Get full text
    Get full text
    Get full text
    Book Chapter
  7. 7

    Robotics in Education by Norashikin, M. Thamrin, Addie, Irawan, Zurita, Zulkifli, Syed Abdul Mutalib, Al Junid, Megat Syahirul Amin, Megat Ali, Anwar P. P., Abdul Majeed

    Published 2026
    “…Spanning six chapters, it examines robotics’ ability to enhance technical and collaborative skills while addressing challenges such as resource accessibility and curriculum integration. Core programming concepts, including control systems, algorithm design, and debugging, are elaborated upon using tools like Python and ROS. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Book
  8. 8

    Development of an integrated scheduling model for handling equipment in automated port container terminals by Sadeghian, Syed Hamidreza

    Published 2014
    “…In this research, a mixed-integer programming model is developed which considers the integration of ALVs, Quay Cranes and Yard Cranes at automated container terminals with unlimited buffer spaces. …”
    Get full text
    Get full text
    Thesis
  9. 9

    'Chapter 10: 5G-enabled IoT applications in healthcare: Transforming the Industry 5.0 healthcare landscape' in "1st Edition, The Future of Human-Computer Integration Industry 5.0 T... by Mohamad Nazim, Jambli, Mohamad Zul Haziq, Mohd Fadzli, Sinarwati, Mohamad Suhaili, Nur Haryani, Zakaria

    Published 2024
    “…The Future of Human-Computer Integration: Industry 5.0 Technology, Tools, and Algorithms provides a valuable insight into how Industry 5.0 technologies, tools, and algorithms can revolutionise industries and drive innovation. …”
    Get full text
    Get full text
    Get full text
    Book Chapter
  10. 10
  11. 11

    A review of slicing techniques in software engineering by Shah, Asadullah, Raza, Ali, Hassan, Basri, Shah, Abdul Salam

    Published 2015
    “…Quite a large numbers of variants for the program slicing have been analyzed along with the algorithms to compute the slice. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  12. 12
  13. 13
  14. 14

    Leaf condition analysis using convolutional neural network and vision transformer by Yong, Wai Chun, Ng, Kok Why, Haw, Su Cheng, Naveen, Palanichamy, Ng, Seng Beng

    Published 2024
    “…As a result, although customers may receive an excellent interactive features programme, the backend algorithm is not optimized. This problem may discourage users from applying the program to solve plant disease problems. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15
  16. 16

    Oil Palm Yield Data Collection Using Image Processing by Yee, Rachel Jee San

    Published 2021
    “…This project is an automated drone program integrated with image processing for academic purpose. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  17. 17

    A three-level universal electric vehicle charger based on voltage-oriented control and pulse-width modulation by Al-Ogaili, Ali Saadon Mtair, Aris, Ishak, Verayiah, Renuga, Ramasamy, Agileswari, Marsadek, Marayati, Rahmat, Nur Azzammudin, Hoon, Yap, Aljanad, Ahmed, Al-Masri, Ahmed N.

    Published 2019
    “…This work presents the complete design process of a universal EV charger with a special focus on its control algorithms. In this regard, a novel control algorithm based on the integration of voltage-oriented control (VOC) and the sinusoidal pulse-width modulation (SPWM) technique is proposed to ensure effective Levels 1, 2, and 3 battery charging. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Feedback Control Of Inverted Pendulum Using Raspberry Pi Microcontroller And Arduino UNO by Leslie Kneoh, Yen Sing

    Published 2018
    “…The algorithms for controlling the motor and the encoder are built to perform their respective functions. …”
    Get full text
    Get full text
    Monograph
  19. 19

    AI recommendation penetration testing tools for password attacks: random forest by Rozman, Nurulasyiqin, Saad, Shahadan

    Published 2025
    “…This project developed an AI-based recommendation system using the Random Forest algorithm to address the complexities of selecting appropriate penetration testing tools for password attacks. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20