Search Results - (( reading application based algorithm ) OR ( java application customization algorithm ))

Refine Results
  1. 1
  2. 2

    Analysis on reading image through camera image by Amir Hamzah Ani

    Published 2024
    text::Final Year Project
  3. 3
  4. 4
  5. 5

    RFID data reliability optimiser based on two dimensions bloom filter by Yaacob, Siti Salwani, Mahdin, Hairulnizam, Kasim, Shahreen

    Published 2017
    “…The noise and duplicate data filtering algorithm was constructed based on bloom filter. There are two bloom filters in one algorithm where each filter holds function either to remove noise data and to recognize data as correct reading from duplicate data reading. …”
    Get full text
    Get full text
    Article
  6. 6

    Genetic algorithm optimized receiver-oriented packet clustering in multi-buffer network card by Nurika, O., Hassan, M.F., Zakaria, N., Jung, L.T.

    Published 2016
    “…In a network card, there is a packet clustering mechanism that if optimized, will increase the speed of packet reading/access at the application layer. This packet clustering optimization is an expansion of our previous base network card optimization in cloud network environment, using genetic algorithm. …”
    Get full text
    Get full text
    Article
  7. 7
  8. 8

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10

    Improved elitist genetic algorithm for reactive power planning in power system / Mohamad Fadhil Mohd Kamal by Mohd Kamal, Mohamad Fadhil

    Published 2010
    “…The genetic algorithm (GA) is a search technique based on the behaviour of natural genetics. …”
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12

    Enhanced Model Compression for Lipreading Recognition based on Knowledge Distillation Algorithm by Qianru, Lu, Kuryati, Kipli, Tengku Mohd Afendi, Zulcaffle, Yuan, Liu, Xiangju, Liu, Bo, Wang

    Published 2025
    “…Therefore, three knowledge distillation compression algorithms are proposed in this paper: Three different knowledge distillation compression algorithms, an offline model compression algorithm based on multi-feature transfer (MTOF), an online model compression algorithm based on adversarial learning (ALON), and an online model compression algorithm based on consistent regularization(CRON) to complete the compression of the Chinese character sequence output by the model. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Virtual reality in algorithm programming course: practicality and implications for college students by Dewi, Ika Parma, Ambiyar, Mursyida, Lativa, Effendi, Hansi, Giatman, Muhammad, Efrizon, Hanafi, Hafizul Fahri, Ali, Siti Khadijah

    Published 2024
    “…The reliability of VR supports various variations in learning, including learning programming algorithms. This research aims to design and develop VR in learning programming algorithms. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14
  15. 15

    Dermedys: Android-based dermatological diagnostic and analytic expert system by Adamu, Abdul-Hakeem, Akin-Bashiru, Tumilara, Salleh, Norsaremah

    Published 2017
    “…An android application, ‘Dermedys’ with a knowledge base of five erythemato-squamous diseases was developed to implement the algorithm.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  16. 16

    Intelligent agent for e-commerce using genetic algorithm / Kok Sun Sun by Kok , Sun Sun

    Published 2000
    “…In order to develop an intelligent agent, various programming techniques are used in achieving the property of self learning, information retrieval and searching algorithm. The system design is based on the features of a search engine which consist of "'Spider" to read through the HTML pages, .. …”
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18

    Modified Data Encryption Standard Algorithm for Textbased Applications by Mohamed Khmag, Asem Ib.

    Published 2006
    “…Because of its short time execution and higher authentication, using this algorithm will ensure the security for internet applications.…”
    Get full text
    Get full text
    Thesis
  19. 19

    New approach of cryptography algorithm for e- mail applications by Khmag, Asem, Babiker, Elsadig, Ramli, Abd Rahman

    Published 2005
    “…The main steps in this algorithm started with reading the plain text "Original Message" from the user. …”
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20

    Development And Analysis Of Near-Infrared Spectroscopy Technique For Non-Invasive Blood Glucose Monitoring System by Abd. Salam., Nurul Akmal

    Published 2019
    “…A prototype of non-invasive blood glucose with the algorithm to convert voltage reading to glucose reading was developed based on the acquisition of the experiments that have been carried out. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis