Search Results - (( java interaction efficient algorithm ) OR ( basic competency based algorithm ))
Search alternatives:
- interaction efficient »
- java interaction »
- basic competency »
- competency based »
-
1
Network game (Literati) / Chung Mei Kuen
Published 2003“…It should be an interesting, time and value worth topic to research on. By using Java applet, it will give a good interactive response since it does not suffer from the delays or variability of bandwidth associated with network connection. …”
Get full text
Get full text
Thesis -
2
Input-output based relation combinatorial testing using whale optimization algorithm for generating near optimum number of test suite
Published 2025“…Given the impracticality of testing every possible interaction due to time, budget, and resource constraints, combinatorial testing, which is t-way testing, is adopted to cover parameter interactions efficiently. …”
Get full text
Get full text
Get full text
Article -
3
Assessing the outcome of Competencies Level from Knowledge-Based Project
Published 2008Get full text
Get full text
Final Year Project -
4
-
5
-
6
Hybrid-discrete multi-objective particle swarm optimization for multi-objective job-shop scheduling
Published 2022“…It is also discovered that the hybrid-discrete MOPSO (HD-MOPSO) algorithm manages to obtain higher values in the performance metrics consisting of non-dominance ratio and hypervolume compared to the competing algorithms. …”
Get full text
Get full text
Get full text
Thesis -
7
Mathematical simulation for 3-dimensional temperature visualization on open source-based grid computing platform
Published 2009“…Each web services are easily maintainable since there is loose coupling between interacting nodes. The development of this architecture is based on several programming language as it involves algorithm implementation on C, parallelization using Parallel Virtual Machine (PVM) and Java for web services development. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
8
Network monopoly / Tan Kean Yeap
Published 2002“…The main aspect of this thesis is to produce a network monopoly system, which process multiple game sessions concurrently, enabling users to play the graphical game with people within the network. The algorithm design and implementation method mustnot only be workable, but also highly efficient in terms of execution speed and respond time. …”
Get full text
Get full text
Thesis -
9
Composing multi-relations association rules from crowdsourcing remuneration data
Published 2022“…To assign it to a worker, the platform must first identify the types of tasks and match them to the appropriate workers based on their level of competency. Each worker has different ICT competencies which affect work quality and remuneration. …”
Get full text
Get full text
Get full text
Article -
10
Development of mobile application of event assistant and booking sport facilities for UiTM Seremban 3 Campus using wofkflow management system / Ahmad Haiqal Abd Halim, Ahmad Yusuf...
Published 2019“…In this research, its content of the step on how to apply the method of WfMS in a mobile application with the use of an android studio. The algorithm for the WfMS is written using Java script in this research. …”
Get full text
Get full text
Student Project -
11
Investigating computational thinking among primary school students in Terengganu using visual programming
Published 2022“…The findings of this study reveal that although the participants’ CT skills competency in the animation phase is in the Basic level, there is improvement of CT skills competency to the Developing level in the game phase. …”
Get full text
Get full text
Thesis -
12
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…A novel security component named â��intelligent security engineâ�� is introduced which learns the possible occurrences of security threats on SOA using artificial neural networks learning algorithms, then it predicts the potential attacks on SOA based on obtained results by the developed theoretical security model, and the written algorithms as part of security solution prevent the SOA attacks. …”
Get full text
Get full text
Article -
13
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…A novel security component named â��intelligent security engineâ�� is introduced which learns the possible occurrences of security threats on SOA using artificial neural networks learning algorithms, then it predicts the potential attacks on SOA based on obtained results by the developed theoretical security model, and the written algorithms as part of security solution prevent the SOA attacks. …”
Get full text
Get full text
Article
