Search Results - (( java validating system algorithm ) OR ( program visualisation a algorithm ))

Refine Results
  1. 1

    Effectiveness of algorithm visualisation in studying complex algorithms: a case study using TRAKLA Ravie / Chandren Muniyandi, Ali Maroosi by Muniyandi, Chandren, Maroosi, Ali

    Published 2015
    “…Algorithm visualisation (AV) can be utilised to improve students ’programming and programme comprehension skills. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Priority and dynamic quantum time algorithms for central processing unit scheduling by Mohammed, Maysoon A.

    Published 2018
    “…Central Processing Unit is scheduled using different types of scheduling algorithms. One of the most widely algorithm used in scheduling with sharing and batch operating systems is Round Robin. …”
    Get full text
    Get full text
    Thesis
  3. 3

    The efficacy of personal computer (PC) AI image enhancer software on low and high contrast PA chest radiograph: an experimental study by Baharudin, Nurul Atiqah, Ahmad Zaiki, Farah Wahida

    Published 2026
    “…Methods: An experimental investigation was undertaken using five PC AI image enhancer programs to visualise the thoracic anatomy. Experts examined the radiographs using visual grading analysis (VGA), which involves visualising 16 common chest anatomical features. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…Besides that, the security of the proposed protocol is validated using the formal analysis tool, AVISPA. The correctness of the proposed protocol is demonstrated in a simulation model developed in JAVA TCP/IP socket. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization by Mohammad Ata, Karimeh Ibrahim

    Published 2019
    “…The proposed embedded system has achieved positive outcomes in comparison to the current system and the traditional algorithm with regards to the shortest path. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Secure E-Voting With Blind Signature by Ibrahim, Subariah, Kamat, Maznah, Salleh, Mazleena, Abdul Aziz, Shah Rizan

    Published 2003
    “…The voter’s private key for digital signature is protected by using password-based encryption with SHA and Twofish-CBC algorithm so that only valid voter can use it.…”
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    Correlation analysis and predictive performance based on KNN and decision tree with augmented reality for nuclear primary cooling process / Ahmad Azhari Mohamad Nor by Mohamad Nor, Ahmad Azhari

    Published 2024
    “…The intricate nature of these systems demands a well-managed maintenance program, prompting the need for a comprehensive characterisation of the primary cooling system. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly by Zulkifly, Ahmad Zuladzlan

    Published 2019
    “…On the Construction phase, the development of the prototype has been started. All the algorithm for the engine has been developed by using Java script language. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Reconstruction algorithm of calibration map for RPT technique in quadrilateral bubble column reactor using MCNPX code by Mohd Yunos, Mohd Amirul Syafiq, Anak Usang, Mark Dennis, Ithnin, Hanafi, Hussain, Siti Aslina, Mohamed Yusoff, Hamdan, Sipaun, Susan

    Published 2018
    “…Calibration algorithm was developed for radioactive isotopes Au-198 and Sc-46 particle position verification and determination of statistical uncertainty from the introduction of a various number of primary photon emission. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Visualisation tool to study malaria transmission using network modelling by Wong,, Ji Yeh

    Published 2014
    “…The output from this visualisation tool shows predicted hotspots which harbour the infected malaria vectors. This output was validated with UCINET 6.0 as the benchmark system. …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  11. 11
  12. 12

    Human activity recognition via accelerometer and gyro sensors by Tee, Jia Lin

    Published 2023
    “…To implement the data engineering system proposed, two mobile applications, SensorData and SensorDataLogger with user-friendly interfaces and intuitive functionalities are developed using Java programming language and Android Studio. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  13. 13

    Tacit knowledge for business intelligence framework using cognitive-based approach by Surbakti, Herison

    Published 2022
    “…The framework was tested on 23 librarians from several university libraries in West Java and Yogyakarta, Indonesia. The algorithm starts with a content targeted interview to identify the list of problems faced by librarians. …”
    Get full text
    Get full text
    Thesis
  14. 14

    FBGA-based implementation of electronic abacus using altera DE2 board by Sidek, Azmi

    Published 2017
    “…DE2 115 is chosen as the development module and VHDL as main programming language. The arithmetic algorithm developed for the electronic abacus is limited to the computational of whole numbers only. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Development of open platform controller for step-NC compliant CNC system by Chi Adam, Mohd Khairil Anbia

    Published 2020
    “…The hardware of the system was upgraded with the new servo system combined with SSCNET implementation to improve the functionality and efficiency of the new system. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    An enhancement of multi-factor weighted approach technique in prioritizing test cases by comparing similarity distance by Al-Shaibani, Alaa Alrhman Mohammed Raweh, Ahmad, Johanna, Hassan, Rohayanti, Baharom, Salmi, Antari, Dwinta Suci

    Published 2025
    “…Traditionally, techniques rely on source code or a specification for the tested system. Therefore, numerous factors and techniques have been used to optimize the prioritization process. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Constrained clustering approach to aid in remodularisation of object-oriented software systems / Chong Chun Yong by Chong, Chun Yong

    Published 2016
    “…This research follows an empirical research methodology, where the proposed approach is validated using 40 object-oriented open-source software systems written in Java. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC by Ismail, Haqi Khalid

    Published 2021
    “…To prove that the proposed design is suitable for IIoT, a new scheme is proposed namely a secure, efficient, and lightweight multi-factor authentication scheme for cross-domain IIoT systems (SELAMAT). In addition, a proof of concept is constructed to validate the proposed multi-factor Kerberos authentication using Java programming language. …”
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20

    Anfis Modelling On Diabetic Ketoacidosis For Unrestricted Food Intake Conditions by Saraswati, Galuh Wilujeng

    Published 2017
    “…Samples data were recorded in the morning before food intake and two hours after food intake using four MQ 2, MQ 5, MQ 6 and MQ 8 sensors, in previously built Electronic Nose prototype system. A 5-fold cross-validation testing was implemented for classification results analysis. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis