Search Results - (( data reduction among algorithm ) OR ( java application interface algorithm ))

Refine Results
  1. 1

    Real-time algorithmic music composition application. by Yap, Alisa Yi Hui

    Published 2022
    “…In addition, the system also utilises JavaFx and jFugue for its graphical user interface and music programming respectively. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  2. 2

    Application-Programming Interface (API) for Song Recognition Systems by Murtadha Arif Sahbudin, Chakib Chaouch, Salvatore Serrano

    Published 2024
    “…In addition the implementation is done by algorithm using Java’s programming language, executed through an application developed in the Android operating system. …”
    Article
  3. 3

    Visdom: Smart guide robot for visually impaired people by Lee, Zhen Ting

    Published 2025
    “…The system architecture integrates ROS 2 on a Raspberry Pi, with TCP/IP connectivity enabling remote operation. An Android mobile application, developed using Java and the java.net.Socket library, provides an intuitive and accessible user interface for seamless interaction with the robot. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  4. 4
  5. 5

    Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework by Asaad Aref, Ibrahim

    Published 2004
    “…A design proposal was outlined to provide an adaptive client/server approach to stream audio contents using Real-Time Transport Protocol (RTP) involving architecture based on the Java Media Framework (JMF) Application Programmable Interfaces (API).RTP protocol is the Internet-standard protocol for the transport of real-time data, including audio and video and can be implemented by using Java Media Framework (JMF). …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    Implementation of (AES) Advanced Encryption Standard algorithm in communication application by Moh, Heng Huong

    Published 2014
    “…The concept of ABS algorithm was firstly studied, including the definition, historical background, and a brief comparison was made between the ABS algorithm with other types of algorithm. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  8. 8

    SANAsms: Secure short messaging system for secure GSM mobile communication by Anuar, N.B., Azlan, I.M., Wahid, A.W.A., Zakaria, O.

    Published 2008
    “…The application is designed to satisfy the user friendly interfaces and intent to be used by the end user without having the advanced knowledge in mobile security. …”
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    HDRA: A Haybird Data Reduction and Routing Algorithm by Hussein, M. K., Marghescu, Ion, A. M. Alduais, Nayef

    Published 2024
    “…Consequently, this study introduces a Hybrid Data Reduction and Routing Algorithm (HDRA). The principal aim of HDRA is to prolong the lifespan of clusterbased WSNs. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10
  11. 11

    HDRA: A Haybird Data Reduction and Routing Algorithm by M. K. Hussein, M. K. Hussein, Ion Marghescu, Ion Marghescu, Nayef A. M. Alduais, Nayef A. M. Alduais

    Published 2024
    “…Consequently, this study introduces a Hybrid Data Reduction and Routing Algorithm (HDRA). The principal aim of HDRA is to prolong the lifespan of clusterbased WSNs. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Data redundancy reduction in wireless sensor network by Adawy, Mohammad Ibrahim, Awang Nor, Shahrudin, Mahmuddin, Massudi

    Published 2018
    “…Data aggregation and numerous data redundancy reduction algorithms are employed to solve this problem. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13
  14. 14

    Rtl Implementation Of Secure Hash Algorithm 3 (Sha-3) Towards Smaller Area by Lim , Yen Ruen

    Published 2017
    “…Among all of the cryptography measures, Secure Hash Algorithm 3 (SHA-3) is the newest and secure cryptographic hash algorithm in the current electronic industry. …”
    Get full text
    Get full text
    Thesis
  15. 15

    A novel state space reduction algorithm for team formation in social networks by Rehman, Muhammad Zubair, Kamal Zuhairi, Zamli, Almutairi, Mubarak, Chiroma, Haruna, Aamir, Muhammad, Kader, Md. Abdul, Nazri, Mohd. Nawi

    Published 2021
    “…Previously, large datasets were not closely inspected for the large-scale distributions & relationships among the researchers, resulting in the algorithms failing to scale well on the data. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    An evaluation of feature selection technique for dendrite cell algorithm by Mohamad Mohsin, Mohamad Farhan, Hamdan, Abdul Razak, Abu Bakar, Azuraliza

    Published 2014
    “…From the experiment, the Rough Set Genetic Algorithm reduct is found to be the most effect feature selection for dendrite cell algorithm when it generates a consistent result for all evaluation metrics. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17
  18. 18

    Web-based expert system for material selection of natural fiber- reinforced polymer composites by Ahmed Ali, Basheer Ahmed

    Published 2015
    “…As Java is platform independent and easy to be deployed in web based application and accessible through the World Wide Web (www), this expert system can be one stop application for materials selection.…”
    Get full text
    Get full text
    Thesis
  19. 19

    A False Alert Reduction And An Alert Score Assessment Framework For Intrusion Alerts by Al-Saedi, Karim Hashim Kraidi

    Published 2013
    “…It combines the following algorithms: the first algorithm is New Alert Reduction (NAR) algorithm to remove the redundancy from the alert’s file and reduce the false positives.…”
    Get full text
    Get full text
    Thesis
  20. 20

    Optimising cloud computing performance with an enhanced dynamic load balancing algorithm for superior task allocation by Zhanuzak, Raiymbek, Ala'anzy, Mohammed Alaa, Othman, Mohamed, Algarni, Abdulmohsen

    Published 2024
    “…Additionally, if a VM cannot meet a cloudlet's deadline, the algorithm redirects the cloudlet to a secondary data centre and reconfigures CPU resources among VMs to ensure optimal allocation. …”
    Get full text
    Get full text
    Get full text
    Article