Search Results - (( variable intention a algorithm ) OR ( java application during algorithm ))

Refine Results
  1. 1

    Enhancing the entrepreneurial intention of the retiring military personnel through entrepreneurial training by Yusuf, Lamidi

    Published 2017
    “…This study examined the factors enhancing the entrepreneurial intention of the retiring military personnel in Nigeria, using entrepreneurial training as a moderator. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    A new modified differential evolution algorithm scheme-based linear frequency modulation radar signal de-noising by Al-Dabbagh, Mohanad Dawood, Al-Dabbagh, Rawaa Dawoud, Raja Abdullah, Raja Syamsul Azmir, Hashim, Fazirulhisyam

    Published 2015
    “…A modified crossover scheme called rand-length crossover was designed to fit the proposed variable-length DE, and the new DE algorithm is referred to as the random variable-length crossover differential evolution (rvlx-DE) algorithm. …”
    Get full text
    Get full text
    Article
  3. 3

    SUDOKU HELPER by Abdul Razak, Muhammad Asyraf

    Published 2015
    “…In this paper research, author presents an algorithm to provide a tutorial for any Sudoku player who got stuck during the solving process. …”
    Get full text
    Get full text
    Final Year Project
  4. 4

    Consumers' intention to use e-money mobile using the decomposed theory of planned behavior by Husnil, Khatimah

    Published 2016
    “…Results show that all variables had significant positive influence on the intention to use e-money mobile excluded the awareness. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6

    Test of Self Por [decoded] trait no. 2 / Syafiq Abdul Samat by Abdul Samat, Syafiq

    Published 2021
    “…In this masterpiece, I present another variation of Hingarmera algorithm titled “Noise Per Dot", which mimics some of the traits of making a painting. …”
    Get full text
    Get full text
    Book Section
  7. 7

    Talkout : Protecting mental health application with a lightweight message encryption by Gavin Teo Juen

    Published 2022
    “…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  8. 8

    Modeling purchase intention towards edible bird's nest products among Malaysians by Mohamad Shukri, Nurul Nabilah Huda, Mohd Nawi, Nolila, Abdullah, Amin Mahir, Man, Norsida

    Published 2018
    “…Results showed logistic regression outer perform other classifiers to develop the purchase intention model. There are five variables identified which consist of age, gender, price, accessibility and halal authorize. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Determinants of intention to pay Zakat on employment income by civil servants in Kano State, Nigeria by Farouk, Abubakar Umar

    Published 2018
    “…The results established the relevance of Attitude, Capability, Employer Referents and Government Support as key determinants of Zakat compliance intention. It also confirmed the postulation that Attitude towards a behavioral object is uni-dimensional. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    The influence of TikTok marketing on consumer purchase intention among students / Nurazree Mahmud … [et al.] by Mahmud, Nurazree, Yaakob, Ahmad Mirza Nabil, Abd Majid, Nurul Ain, Nurulzlan, Nur Afrina, Khairil, Nur Husnina

    Published 2024
    “…The findings show that TikTok marketing has a major impact on student purchase behaviour, with product quality and price having a major influence on intentions to buy. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    The influence of Robo-advisory services on Malaysia university student’s investment intention by Tan, Yung Hui, Lim, Jia Eng, Lim, Keh Xin, Zeng, Yi

    Published 2025
    “…The study adopts the Technology Acceptance Model (TAM) as the theoretical foundation, integrating elements of trust and perceived risk to examine how these factors impact adoption intentions. Data was collected through a structured questionnaire distributed to university students across Malaysia, and a total of 135 valid responses were analyzed using Jamovi statistical software version 2.6.24. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  12. 12
  13. 13

    AI technology factors mediated via intention to use in UAE petroleum companies case study by Alblooshi, Surour Mohammed Surour Hamada

    Published 2024
    “…This mediation signifies that behavioral intention plays a discernible role in influencing the impact of these independent variables on AI adoption, although the relationships are not entirely mediated by behavioral intention. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15

    Adopting genetic algorithm to enhance state-sensitivity partitioning by Sultan, Ammar Mohammed, Baharom, Salmi, Abd Ghani, Abdul Azim, Din, Jamilah, Zulzalil, Hazura

    Published 2015
    “…Even recognizing the finite limits on the size of the queue, there is an infinite set of these sequences and with no upper bound on the length of such a sequence. Thus, a lengthy test sequence might consist of redundant data states. …”
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    Adopting genetic algorithm to enhance state-sensitivity partitioning by Mohammed Sultan, Ammar, Baharom, Salmi, Abd Ghani, Abdul Azim, Din, Jamilah, Zulzalil, Hazura

    Published 2015
    “…Even recognizing the finite limits on the size of the queue, there is an infinite set of these sequences and with no upper bound on the length of such a sequence.Thus, a lengthy test sequence might consist of redundant data states. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17

    A malware analysis and detection system for mobile devices / Ali Feizollah by Ali, Feizollah

    Published 2017
    “…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications by Hydara, Isatou

    Published 2015
    “…This research work was limited to Java based web applications. In future research, the method can be extended to include other programming languages as well as other similar web application security vulnerabilities.…”
    Get full text
    Get full text
    Thesis
  19. 19

    Cyber hygiene during Covid-19 to avoid cyber attacks by Lee, Yvonne Yi Jin

    Published 2022
    “…After received the responds from participants, we had run the analysis on all the variables by using SmartPLS 3.3 and calculate the PLS-SEM algorithm of the variables. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  20. 20

    Human activity recognition via accelerometer and gyro sensors by Tee, Jia Lin

    Published 2023
    “…To implement the data engineering system proposed, two mobile applications, SensorData and SensorDataLogger with user-friendly interfaces and intuitive functionalities are developed using Java programming language and Android Studio. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis