Search Results - (( java interactive efficient algorithm ) OR ( post implementation function algorithm ))
Search alternatives:
- implementation function »
- interactive efficient »
- post implementation »
- function algorithm »
- java interactive »
-
1
Network game (Literati) / Chung Mei Kuen
Published 2003“…It should be an interesting, time and value worth topic to research on. By using Java applet, it will give a good interactive response since it does not suffer from the delays or variability of bandwidth associated with network connection. …”
Get full text
Get full text
Thesis -
2
Input-output based relation combinatorial testing using whale optimization algorithm for generating near optimum number of test suite
Published 2025“…Given the impracticality of testing every possible interaction due to time, budget, and resource constraints, combinatorial testing, which is t-way testing, is adopted to cover parameter interactions efficiently. …”
Get full text
Get full text
Get full text
Article -
3
Development of obstacle avoidance technique in web-based geographic information system for traffic management using open source software
Published 2014“…By implementing this function, it enhances the Dijkstra algorithm ability in network analysis. …”
Get full text
Get full text
Get full text
Article -
4
Parallel Implementation Of Field Visualizations With High Order Tetrahedral Finite Elements
Published 2013“…This work proposes and implements an efficient framework for data visualization with tetrahedron finite elements having hierarchical basis functions. …”
Get full text
Get full text
Thesis -
5
-
6
Mathematical simulation for 3-dimensional temperature visualization on open source-based grid computing platform
Published 2009“…Each web services are easily maintainable since there is loose coupling between interacting nodes. The development of this architecture is based on several programming language as it involves algorithm implementation on C, parallelization using Parallel Virtual Machine (PVM) and Java for web services development. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
7
Network monopoly / Tan Kean Yeap
Published 2002“…The main aspect of this thesis is to produce a network monopoly system, which process multiple game sessions concurrently, enabling users to play the graphical game with people within the network. The algorithm design and implementation method mustnot only be workable, but also highly efficient in terms of execution speed and respond time. …”
Get full text
Get full text
Thesis -
8
Restaurant review system with data visualization and text search using TF-IDF algorithm / Syazwina Abd Hamid
Published 2020“…Outcome gained from functionality and usability testing indicate that all functions in the system work perfectly and received promising feedback from users. …”
Get full text
Get full text
Thesis -
9
The Use of Transmission Line Modelling to Test the Effectiveness of I-kaz as Autonomous Selection of Intrinsic Mode Function
Published 2017“…This paper proposed the implementation of Integrated Kurtosis-based Algorithm for z-filter Technique (I-kaz) to kurtosis ratio (I-kaz-Kurtosis) for that allows automatic selection of intrinsic mode function (IMF) that's should be used. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
10
Modeling of Functional Electrical Stimulation (FES): Powered Knee Orthosis (PKO) assisted gait exercise in post-stroke rehabilitation / Adi Izhar Che Ani
Published 2023“…Rehabilitation exercise has been deemed one of the most promising methods for hemiplegic regain function. Researchers have recently utilized various exercise techniques in conjunction with Functional Electrical Stimulation (FES). …”
Get full text
Get full text
Thesis -
11
Finger Exoskeleton for Early Acute Post Stroke Rehabilitation: Control Design and Performance Analysis
Published 2023Conference Paper -
12
Development of mobile application of event assistant and booking sport facilities for UiTM Seremban 3 Campus using wofkflow management system / Ahmad Haiqal Abd Halim, Ahmad Yusuf...
Published 2019“…In this research, its content of the step on how to apply the method of WfMS in a mobile application with the use of an android studio. The algorithm for the WfMS is written using Java script in this research. …”
Get full text
Get full text
Student Project -
13
Transient analysis for leak signature identification based on Hilbert Huang transform and integrated kurtosis algorithm for z-notch filter technique
Published 2018“…The HHT is a way to decompose a signal into intrinsic mode functions (IMF). However, this method has the difficulty in selecting the suitable IMF for the next data post-processing method, which is Hilbert Transform (HT). …”
Get full text
Get full text
Thesis -
14
-
15
Design of a high-speed, reconfigurable digital rank order filter
Published 2009“…The proposed ROF has been implemented in FGPA and post-fit simulation results are presented in this paper. …”
Get full text
Get full text
Get full text
Article -
16
An intelligent adjustable spanner for automated engagement with multi-diameter bolts/nuts during tightening/loosening process using vision system and fuzzy logic
Published 2018“…Many filters and functions are applied in the image processing stage to efficiently get a clear border for the bolt/nut. …”
Get full text
Get full text
Get full text
Article -
17
Development of Intelligent Leak Detection System Based on Artificial Pressure Transient Signal Using Integrated Kurtosis-Based Algorithm for Z-Filter Technique (I-Kaz) / Hanafi.M.Y...
Published 2017“…HHT is a way to decompose a signal into intrinsic mode function (IMF). However, this method has the difficulty in selecting the suitable IMF for the next data post-processing method which is Hilbert Transform (HT). …”
Get full text
Get full text
Article -
18
Development of intelligent leak detection system based on artificial pressure transient signal using integrated Kurtosis-based Algorithm for Z-filter Technique (I-Kaz)
Published 2017“…HHT is a way to decompose a signal into intrinsic mode function (IMF). However, this method has the difficulty in selecting the suitable IMF for the next data post-processing method which is Hilbert Transform (HT). …”
Get full text
Get full text
Get full text
Article -
19
Security framework based multi agent system architecture to facilitate data fetching from cloud data storage
Published 2012“…To simulate the agents, Oracle database packages and triggers are used to implement agent functions, and Oracle jobs are utilized to create agents. …”
Get full text
Get full text
Thesis -
20
Intentional Islanding Solution Based on Modified Discrete Particle Swarm Optimization Technique
Published 2023Conference Paper
