Search Results - (( programming using context algorithm ) OR ( java data control algorithm ))

Refine Results
  1. 1

    Design Of Robot Motion Planning Algorithm For Wall Following Robot by Ali Hassan, Muhamad Khairul

    Published 2006
    “…Computer A will be sent the data to computer B through the internet/LAN using JAVA program. …”
    Get full text
    Get full text
    Monograph
  2. 2

    Café Web Based System Using Priority Scheduling Approach by Fatimah, Ghazali, Rohana, Ismail, Mohamad Hariz, Hasni

    Published 2017
    “…The priority scheduling algorithm is based on Control Processing Unit scheduling algorithm where it has a priority to execute tasks. …”
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3
  4. 4

    Automated time series forecasting by Ismail, Suzilah, Zakaria, Rohaiza, Tuan Muda, Tuan Zalizam

    Published 2011
    “…Moving Average, Decomposition, Exponential Smoothing, Time Series Regressions and ARIMA) were used.The algorithm was developed in JAVA using up to date forecasting process such as data partition, several error measures and rolling process.Successfully, the results of the algorithm tally with the results of SPSS and Excel.This automatic forecasting will not just benefit forecaster but also end users who do not have in depth knowledge about forecasting techniques.…”
    Get full text
    Get full text
    Get full text
    Monograph
  5. 5

    A cluster-based hybrid replica control protocol for high availability in data grid by Mabni, Zulaile

    Published 2019
    “…Therefore, a replica control protocol must consider the dynamic aspects of the Data Grid. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7
  8. 8

    Priority and dynamic quantum time algorithms for central processing unit scheduling by Mohammed, Maysoon A.

    Published 2018
    “…Central Processing Unit is scheduled using different types of scheduling algorithms. One of the most widely algorithm used in scheduling with sharing and batch operating systems is Round Robin. …”
    Get full text
    Get full text
    Thesis
  9. 9

    LCSS-Based Algorithm for Computing Multivariate Data Set Similarity: A Case Study of Real-Time WSN Data by Khan, Rahim, Ali, Ihsan, Altowaijri, Saleh, Zakarya, Muhammad, Rahman, Atiq Ur, Ahmedy, Ismail, Khan, Anwar, Gani, Abdullah

    Published 2019
    “…The proposed algorithm performs exceptionally well on numerous multivariate data sets compared with the classical dynamic programming-based algorithms. …”
    Get full text
    Get full text
    Article
  10. 10

    Enhancing understanding of programming concepts through physical games by Raja Yusof, Raja Jamilah, Habib, Ahsan

    Published 2017
    “…The activities were conducted involving first and fourth year undergraduate students and Master students in Programming 1 (31 students), Data Structure (6 students), Analysis of Algorithm (12 students) and Advanced Algorithm (22 students) courses respectively. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11
  12. 12
  13. 13

    Comparative Analysis Using Bayesian Approach To Neural Network Of Translational Initiation Sites In Alternative Polymorphic Contex by Herman, Nanna Suryana, Husin, Nurul Arneida, Hussin, Burairah

    Published 2012
    “…Widely accepted as an important signal for gene discovery,translation initiation sites (TIS) in weak context has been the main focus in this paper.Many TIS prediction programs have been developed for optimal context,but they fail to successfully predict the start codon if the contexts conditions are in weak positions. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    A Novel Integrating Between Tool Path Optimization Using An ACO Algorithm And Interpreter For Open Architecture CNC System by Yusof, Yusri, Latif, Kamran, Hatem, Noor, A. Kadir, Aini Zuhra, Mohammed, M.A

    Published 2021
    “…In the context of automatic NC program production, the optimization of the cutting tool’s travel path could be achieved by integrating the ACO algorithm and the Open Architecture Control (OAC) into commercial CAD/CAM. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Reservoir system modelling using nondominated sorting genetic algorithm in the framework of climate change by Nurul Nadrah Aqilah, Tukimat

    Published 2014
    “…In conclusion, this finding contributes toward the development of models using evolution algorithm and statistical methods for sustainable water resources planning and management in the context of future climate change…”
    Get full text
    Get full text
    Thesis
  16. 16

    Implementation of hashed cryptography algorithm based on cryptography message syntax by Ali, Mohammed Ahnaf

    Published 2019
    “…This design and simulation research is conducted in CMC network security (message encryption context). The design will use MATLAB encryption to show simulation. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    Development of a novel natural frequencies prediction tool for laminated composite plates using integrated artificial neural network (ANN) - simulink MATLAB / Mohd Arif Mat Norman by Mat Norman, Mohd Arif

    Published 2024
    “…The prediction tool utilises an Artificial Neural Network (ANN) with a two-layer feed-forward algorithm and ten hidden layers, using Levenberg-Marquardt as the training algorithm. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Assessment of crops healthiness via deep learning approach: Python / Mohamad Amirul Asyraf Mohd Ramli by Mohd Ramli, Mohamad Amirul Asyraf

    Published 2023
    “…Detecting healthy crops using Python in the context of an analysis project has emerged as an approach that speeds up a process to find out the current state of crops. …”
    Get full text
    Get full text
    Student Project
  19. 19

    Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption by Yeo Zi Zian

    Published 2022
    “…The selected lightweight geo-encryption algorithm will be implemented in the proposed system, vi which develops by using Java language. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  20. 20

    User authentication in public cloud computing through adoption of electronic personal synthesis behavior by Mohanaad Talal Shakir

    Published 2023
    “…Secondly, a questionnaire prepared to examine the acceptance and use of EPSB. Finally, the implemented algorithm tested by comparing the accuracy of the current authentication framework with and without an EPSB algorithm. …”
    text::Thesis