Search Results - (( program reading using algorithm ) OR ( java application bee algorithm ))
Search alternatives:
- java application »
- program reading »
- using algorithm »
- application bee »
- reading using »
- bee algorithm »
-
1
Virtual reality in algorithm programming course: practicality and implications for college students
Published 2024“…The reliability of VR supports various variations in learning, including learning programming algorithms. This research aims to design and develop VR in learning programming algorithms. …”
Get full text
Get full text
Get full text
Article -
2
Encrypted mobile messaging application using AES block cipher cryptography algorithm / Nur Rasyiqah Zulkifli
Published 2019“…The programming language that is used to write the program is Java Language that will run on android phones. …”
Get full text
Get full text
Student Project -
3
Fault detection with optimum March Test Algorithm
Published 2012“…However after solving the undetected fault, the outcome in term of its detection result of Static Double Cell Faults using the specified test algorithm especially Transition Coupling Faults (CFtrs), Write Destructive Coupling Faults (CFwds), Read Destructive Coupling Faults (CFrds) and Deceptive Read Destructive Faults (CFdrds) are observed.…”
Get full text
Conference or Workshop Item -
4
Intelligent agent for e-commerce using genetic algorithm / Kok Sun Sun
Published 2000“…In order to develop an intelligent agent, various programming techniques are used in achieving the property of self learning, information retrieval and searching algorithm. …”
Get full text
Get full text
Thesis -
5
-
6
Hypertension Among Dental Patients: A Single Institution Experience And Development Of A Working Clinical Algorithm For Dental Practitioners
Published 2026journal::journal article -
7
Classification of Google Play application using decision tree algorithm on sentiment analysis of text reviews / Aqil Khairy Hamsani, Ummu Fatihah Mohd Bahrin and Wan Dorishah Wan A...
Published 2023“…The project's objectives are to study the classifying approach of Google Play Store application reviews using the Decision Tree algorithm, develop a prototype of a classifying application program, and evaluate the accuracy model of the review classification program. …”
Get full text
Get full text
Get full text
Article -
8
Text messaging encryption system
Published 2012“…Text Messaging Encryption system is a text message encryption and decryption.Encryption is a process of masking a message so that it is unreadable.Encryption is important to avoid other people to read certain information. The only way to read the information is to know the method on how message is being masked,in this case knowing the algorithm used to encrypt the message. …”
Get full text
Get full text
Undergraduates Project Papers -
9
Ultrasonic parking sensors using triangulation algorithm / Mohamad Syahzmeer Mohamed Sufian
Published 2019“…The sensors used the triangulation formula to obtain accurate readings, where a fixed object was measured at varying distances. …”
Get full text
Get full text
Student Project -
10
Design of DNA fragment assembly using IWP method on application-specific integrated-circuit / Hasniliati Hassan
Published 2017“…Depending on the technology used, it can only read small pieces of base between 20 to 1000 bases. …”
Get full text
Get full text
Thesis -
11
Multiple and solid data background scheme for testing static single cell faults on SRAM memories
Published 2013“…Therefore, the purpose of this thesis is to introduce a Data Background (DB) scheme to generate an optimal March Test Algorithm (MTA) for detecting faults of memory that are undetectable using existing algorithms. …”
Get full text
Get full text
Thesis -
12
Hybrid cryptography algorithm to improve security cloud storage
Published 2017“…Input is given as text files. Particular input is read by the relevant Java program and the encryption time and secrecy are calculated and output on the screen. …”
Get full text
Get full text
Get full text
Thesis -
13
Classification of strategies for solving programming problems using Aol sequence analysis
Published 2019“…This eye tracking study examines participants’ visual attention when solving algorithmic problems in the form of programming problems. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
14
-
15
-
16
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…Obfuscation is used to convert source code into a program that works the same way but is much harder to read and understand. …”
Get full text
Get full text
Thesis -
17
-
18
A cluster-based hybrid replica control protocol for high availability in data grid
Published 2019“…The performance of CBH protocol is evaluated theoretically and using simulations. A discrete event simulator called GridSim and Java programming language is used to simulate the proposed protocol. …”
Get full text
Get full text
Thesis -
19
Performance of time based animation of physic motion
Published 2012“…The fonnula created from this study was programmed into the software development platfonn. The results showed that the use of algorithmic fonnula achieved realistic-timing animation. …”
Get full text
Get full text
Get full text
Thesis -
20
