Search Results - (( java validating system algorithm ) OR ( program visualisation using algorithm ))
Search alternatives:
- program visualisation »
- visualisation using »
- validating system »
- system algorithm »
- using algorithm »
- java »
-
1
Effectiveness of algorithm visualisation in studying complex algorithms: a case study using TRAKLA Ravie / Chandren Muniyandi, Ali Maroosi
Published 2015“…Algorithm visualisation (AV) can be utilised to improve students ’programming and programme comprehension skills. …”
Get full text
Get full text
Get full text
Article -
2
The efficacy of personal computer (PC) AI image enhancer software on low and high contrast PA chest radiograph: an experimental study
Published 2026“…Methods: An experimental investigation was undertaken using five PC AI image enhancer programs to visualise the thoracic anatomy. …”
Get full text
Get full text
Get full text
Get full text
Article -
3
Priority and dynamic quantum time algorithms for central processing unit scheduling
Published 2018“…Central Processing Unit is scheduled using different types of scheduling algorithms. One of the most widely algorithm used in scheduling with sharing and batch operating systems is Round Robin. …”
Get full text
Get full text
Thesis -
4
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…Besides that, the security of the proposed protocol is validated using the formal analysis tool, AVISPA. The correctness of the proposed protocol is demonstrated in a simulation model developed in JAVA TCP/IP socket. …”
Get full text
Get full text
Thesis -
5
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…The proposed embedded system has achieved positive outcomes in comparison to the current system and the traditional algorithm with regards to the shortest path. …”
Get full text
Get full text
Thesis -
6
Secure E-Voting With Blind Signature
Published 2003“…The voter’s private key for digital signature is protected by using password-based encryption with SHA and Twofish-CBC algorithm so that only valid voter can use it.…”
Get full text
Get full text
Conference or Workshop Item -
7
Reconstruction algorithm of calibration map for RPT technique in quadrilateral bubble column reactor using MCNPX code
Published 2018“…The iterative reconstruction algorithms is used to generate and calculate the 2600 coordinates of calibration map from the number of photon counts from the ten NaI scintillation detectors. …”
Get full text
Get full text
Get full text
Article -
8
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…On the Construction phase, the development of the prototype has been started. All the algorithm for the engine has been developed by using Java script language. …”
Get full text
Get full text
Thesis -
9
Correlation analysis and predictive performance based on KNN and decision tree with augmented reality for nuclear primary cooling process / Ahmad Azhari Mohamad Nor
Published 2024“…This application, integrated with a predictive model, offers real-time visualisation of primary cooling system characteristics through handheld devices. …”
Get full text
Get full text
Thesis -
10
Visualisation tool to study malaria transmission using network modelling
Published 2014“…The output from this visualisation tool shows predicted hotspots which harbour the infected malaria vectors. This output was validated with UCINET 6.0 as the benchmark system. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
11
FBGA-based implementation of electronic abacus using altera DE2 board
Published 2017“…The development of electronic abacus is to integrate the use of abacus along with electronic devices which offers better visualisation of the abacus operations. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
12
Extracting Object Oriented Software Architecture from C++ Source Code
Published 2000Get full text
Get full text
Thesis -
13
Human activity recognition via accelerometer and gyro sensors
Published 2023“…To implement the data engineering system proposed, two mobile applications, SensorData and SensorDataLogger with user-friendly interfaces and intuitive functionalities are developed using Java programming language and Android Studio. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
14
Tacit knowledge for business intelligence framework using cognitive-based approach
Published 2022“…The framework was tested on 23 librarians from several university libraries in West Java and Yogyakarta, Indonesia. The algorithm starts with a content targeted interview to identify the list of problems faced by librarians. …”
Get full text
Get full text
Thesis -
15
Development of open platform controller for step-NC compliant CNC system
Published 2020“…The hardware of the system was upgraded with the new servo system combined with SSCNET implementation to improve the functionality and efficiency of the new system. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
16
An enhancement of multi-factor weighted approach technique in prioritizing test cases by comparing similarity distance
Published 2025“…Traditionally, techniques rely on source code or a specification for the tested system. Therefore, numerous factors and techniques have been used to optimize the prioritization process. …”
Get full text
Get full text
Get full text
Article -
17
Constrained clustering approach to aid in remodularisation of object-oriented software systems / Chong Chun Yong
Published 2016“…This research follows an empirical research methodology, where the proposed approach is validated using 40 object-oriented open-source software systems written in Java. …”
Get full text
Get full text
Thesis -
18
Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC
Published 2021“…To prove that the proposed design is suitable for IIoT, a new scheme is proposed namely a secure, efficient, and lightweight multi-factor authentication scheme for cross-domain IIoT systems (SELAMAT). In addition, a proof of concept is constructed to validate the proposed multi-factor Kerberos authentication using Java programming language. …”
Get full text
Get full text
Thesis -
19
-
20
Anfis Modelling On Diabetic Ketoacidosis For Unrestricted Food Intake Conditions
Published 2017“…Samples data were recorded in the morning before food intake and two hours after food intake using four MQ 2, MQ 5, MQ 6 and MQ 8 sensors, in previously built Electronic Nose prototype system. A 5-fold cross-validation testing was implemented for classification results analysis. …”
Get full text
Get full text
Get full text
Get full text
Thesis
