Search Results - (( based application _ algorithms ) OR ( some application interface algorithm ))*

Refine Results
  1. 1

    Online food ordering application using Boyer-Moore algorithm / Muhammad Zulhilmie Dzulkifli by Dzulkifli, Muhammad Zulhilmie

    Published 2021
    “…The main goal of this study is to create an online food ordering app using the corresponding Boyer-Moore string matching algorithm. The application evaluation process is carried out by the developer's functionality test to ensure that there are no unnecessary issues in this app, especially in the main feature. …”
    Get full text
    Get full text
    Thesis
  2. 2

    A primary interface selection policy in heterogeneous networks based on QoS by Masud, M. H., Anwar, Farhat, Bari, S.M. Sadakatul

    Published 2012
    “…This paper proposes a policy that determines different applications’ requirements and chooses an appropriate interface as a primary interface for respective application based on the networks condition to improve Quality-of-Service (QoS). …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  3. 3

    Web based clustering tool using K-MEAN++ algorithm / Muhammad Nur Syazwanie Aznan by Aznan, Muhammad Nur Syazwanie Aznan

    Published 2019
    “…Which is why this project objective is to develop a web based clustering tool using K-MEAN++ algorithm. This project will use the rapid application development (RAD) methodology since this are the most suitable method for developing the system. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Applying SAX-based time series analysis to classify EEG signal using a COTS EEG device by Shanmuga, Pillai A/L Murutha Muthu

    Published 2021
    “…This research will investigate the application of the Symbolic Aggregate Approximation (SAX) algorithm on top of known supervised machine learning techniques to perform EEG signal classification. …”
    Get full text
    Thesis
  5. 5

    E-Grocery application with Geolocation and YOLO Algorithm / Ikhwan Nurhakim Zuzalli and Raihana Md Saidi by Zuzalli, Ikhwan Nurhakim, Md Saidi, Raihana

    Published 2021
    “…The objective of this project is to develop an E-Grocery application using geolocation and YOLO algorithm. The users can store their groceries’ stock in the system using the YOLO algorithm. …”
    Get full text
    Get full text
    Get full text
    Book Section
  6. 6
  7. 7
  8. 8

    Flow regime identification of particles conveying in pneumatic pipeline using electric charge tomography and neural network techniques by Ahmed Sabit, Hakilo

    Published 2006
    “…A high speed data acquisition card DAS1800HC is used to interface the sensors to a personal computer which processes the data using linear back projection algorithm (LBPA) and filtered back projection algorithm (FBPA). …”
    Get full text
    Get full text
    Thesis
  9. 9

    EEG artifact signals tracking and filtering in real time for command control application by Moghavvemi, M., Attaran, A., Moshrefpour Esfahani, M.H.

    Published 2011
    “…In some researches it is also called Brain-Computer interface (BCI). …”
    Get full text
    Conference or Workshop Item
  10. 10

    The application of Hough Transform for corner detection by Jamaludin, Mohad Fuad

    Published 2006
    “…Mean while, the Zhang Suen Thinning Method can be used to reduce the edge points into minima points to speed up the algorithm. To illustrate the problem, the interface program is developed by using Microsoft Visual C++ 6.0.…”
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12

    The design and implementation of a two and three-dimensional triangular irregular network based GIS by Abdul Rahman, Alias

    Published 2000
    “…To facilitate the output of the developed methods and algorithms, software called TinSoft, which is a Windows-based Multiple Document Interface software was developed in this research.…”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14
  15. 15
  16. 16

    Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption by Yeo Zi Zian

    Published 2022
    “…The project's expected outcome is a GPS-Based Physical Identity and Access Management System with the selected lightweight geo-encryption algorithm that can be used to support the control access and management operations of UMS security division.…”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  17. 17

    Runtime pluggable CPU scheduler for linux operating system by Al-Maweri, Nasr Addin Ahmed Salem

    Published 2010
    “…The CPU scheduler uses different scheduling policies (algorithms) to manage such processes. Each scheduling policy has its own properties and suits specific applications or a specific environment. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Conceptual deployment models to secure cloud computing / Hajar Ziglari by Ziglari, Hajar

    Published 2012
    “…The next step will be about development and corresponding interfaces and design patterns for applications to fit the deployment models and working on security protocols and algorithms in the proposed models to have security support in the cryptography part.…”
    Get full text
    Get full text
    Thesis
  19. 19

    Efficient beamforming and spectral efficiency maximization in a joint transmission LTE-A system by Faisal, Ali Raed

    Published 2016
    “…Moreover, addressing the lack-of-diversity issue in Basic Particle Swarm Optimization Algorithm (BPSOA) is a primary concern of this work. …”
    Get full text
    Get full text
    Thesis
  20. 20