Showing 1,521 - 1,540 results of 1,752 for search '"operating systems"', query time: 0.12s Refine Results
  1. 1521

    Volunteer alliance App by Chan, Nikki Pearl Yun Ling

    Published 2017
    “…VolunteerAlliance was implemented on Android and iOS platforms as they are the two most popular operating system used in the market. A web application was also created for organisations to facilitate the creation, approval or rejection of the applications. …”
    Get full text
    Final Year Project (FYP)
  2. 1522

    Design and development of navigation systems for home use robots by Chen, Yingpeng

    Published 2017
    “…Finally using the system ROS (Robot Operating System), the robot implements the function that mapping of different kind of landscape, store and load the map of the landscape. …”
    Get full text
    Final Year Project (FYP)
  3. 1523

    Object recognition system for dual-arm robot in bin packing by Yin, Wanqi

    Published 2018
    “…In this project, some tools were used including Point Cloud Library (PCL), OpenCV and all the functions developed using C++, and Python was implemented into Robot Operation System (ROS) together with the packing planning function and robot control function. …”
    Get full text
    Final Year Project (FYP)
  4. 1524

    PERANCANGAN SISTEM INSTRUMENTASI PENGUKURAN PADA GAS METERING STATION DALAM APLIKASI CUSTODY TRANSFER BERBASIS ORIFICE by , DIO MASERA, , Ir. Balza Achmad, M.ScE

    Published 2013
    “…Design starts from analyzing the operational system then described in the Piping and Instrument Diagrams (P&ID), calculating orifice dimensions, selecting transmitters, designing architecture system and perform a verification through the HMI (Human Machine Interface). …”
    Thesis
  5. 1525

    IDENTIFIKASI TINGKAT KEMATANGAN BUAH TOMAT (Lycopersicon esculentum Mill) MENGGUNAKAN METODE PENGOLAHAN CITRA DAN JARINGAN SARAF TIRUAN by , AISYAH HIDAYATTULLAH, , Dr. Atris Suyantohadi, STP, MT.

    Published 2013
    “…ANN is a computational system which the architecture and operation system inspired by the knowledge about the biological neuron cells in brain. …”
    Thesis
  6. 1526

    Manajemen usaha peternakan ayam petelur dengan penerapan sistem informasi manajemen by Perpustakaan UGM, i-lib

    Published 2001
    “…Development of the software with a modular technique on a text-based operating system allows the end user to operate it on a simple hardware. …”
    Article
  7. 1527

    ANALISIS PERBANDINGAN VOIP SERVER ANTARA BRIKER IPPBX DENGAN ASTERISK by , Setiya Nugroho, , Dr. Ir. Sasongko Pramono H., DEA.

    Published 2011
    “…The difference in the operating system platform is what the writer wanted to learn whether there is an effect on the performance of VoIP systems are built. …”
    Thesis
  8. 1528

    Gymnasium Equipment GIF Motion Learning and Fitness Training Guide Mobile Application / Muhamad Adib Surani by Surani, Muhamad Adib

    Published 2017
    “…This mobile application natively developed for Android Operating System based smartphones only and implementing Analysis, Design, Development, Implementation, Evaluation (ADDIE) as research methodology framework. …”
    Get full text
    Thesis
  9. 1529

    Genome variation and population structure among 1142 mosquitoes of the African malaria vector species Anopheles gambiae and Anopheles coluzzii by Anopheles gambiae 1000 Genomes Consortium

    Published 2020
    “…This data resource provides a foundation for developing new operational systems for molecular surveillance and for accelerating research and development of new vector control tools. …”
    Journal article
  10. 1530

    Good documentation practices: UM experience by Fong, M.Y., Kiran, K., Nik Ahmad, Kamal, Suzeini, A.H.

    Published 2007
    “…These documents can be accessed without the need of any specific software or operating system. Accessibility is through any computer within the campus that has an Internet connection. …”
    Get full text
    Conference or Workshop Item
  11. 1531

    Non-Markovian dynamics of double-well Bose-Einstein condensate-reservoir system by Rajagopal, Kalai Kumar

    Published 2021
    “…We found full analytical solution for the interaction free BECreservoirs for the Markovian operating system but only partial analytical solution is given for its non-Markovian counterpart. …”
    Get full text
    Thesis
  12. 1532

    Fault detection tool for maintenance of wayside signalling and communication by Samion, Norhafiza

    Published 2019
    “…The Kelana Jaya Line (KJL) is the leading urban metro train operator in Malaysia and the eldest unmanned train operation system service use the automatic train-controlled system owned by Rapid KL. …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 1533

    Rough set approach for categorical data clustering by Herawan, Tutut

    Published 2010
    “…The total main memory is 1 Gigabyte and the operating system is Windows XP Professional SP3. Results collected during the experiments on four small datasets and thirteen UCI benchmark datasets for selecting a clustering attribute show that the proposed MDA technique is an efficient approach in terms of accuracy and computational complexity as compared to BC, TR and MMR techniques. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 1534

    Development of MPLS test-bed for network traffic engineering by Jusoh @ Tajudin, Mohd. Taufik

    Published 2005
    “…The goal is to develop MPLS test-bed using Linux operating system with kernel version 2.6.5 as the platform. …”
    Get full text
    Thesis
  15. 1535

    A development of web-based bernese automated global positioning system processing package by Suryamen Suhasril, Haris

    Published 2008
    “…Therefore a single script is needed to control all over the Bernese program, the automated mode of program, interfacing on the web server, the link with the internet, and interaction with the online users at the same time, especially on the user-friendly Windows Operating System. The research methodology which is used is the designing and development of the Automation Script on the website in a personal application server. …”
    Get full text
    Thesis
  16. 1536

    Organizational Improvements by Brand Building Strategies in Axia Academy by Tin, Shin Thed, Fadzill, Faudziah Hanim

    Published 2018
    “…Sales and Marketing Department need to come out with effective plan, Human Resources Department need to recruiting suitable talent and Finance Department need to strengthen cash flow that deeply impact on its daily operation system. Therefore, by using SWOT analysis strategy, AASB has gone through comprehensive exercise to look in- depth for solutions. …”
    Get full text
    Article
  17. 1537

    Hardware-assisted online defense against malware and exploits by Das, Sanjeev Kumar

    Published 2016
    “…Adversary commonly uses exploits to attack an operating system or application vulnerability to gain privileges, so that they can run malicious code in the system. …”
    Get full text
    Thesis
  18. 1538

    Investigation of Waste Cooking Oil as a Tribological Lubricant for Piston Skirt Application by Amirruddin, Abdul Kadir, K., Kadirgama, D., Ramasamy, M. M., Noor, M. M., Rahman

    Published 2016
    “…Lubricant usually use in the operation system especially in engine or machine to run efficiently in order to move on the process that needed. …”
    Get full text
    Conference or Workshop Item
  19. 1539

    A novel design and development of persistence layer for heterogeneous synchronous replication in data grid by Beg, A. H., Noraziah, Abu Yazid, Abdalla, Ahmed N.

    Published 2011
    “…In the proposed replication technique, the replication servers are operating system independent and the entire replication process is not inter dependent nevertheless on the main server. …”
    Get full text
    Article
  20. 1540

    Campus hybrid intrusion detection system using SNORT and C4.5 Algorithm by Slamet, ., Izzeldin, I. Mohd, Fahmi, Samsuri

    Published 2020
    “…The system implementation uses a PC Router with the Ubuntu 18.04 Linux as operating system. As a result of implementing this system: misused detection module uses the signature of attacks to detection the known attacks; anomaly detection module can detect the unknown attacks; signature generation module extracts the signature of attacks that are detected by Anomaly Detection System module, and maps the signatures into snort rules.…”
    Get full text
    Get full text
    Conference or Workshop Item