Search Results - (( java application using algorithm ) OR ( model generation using algorithm ))

Refine Results
  1. 1

    Real-time algorithmic music composition application. by Yap, Alisa Yi Hui

    Published 2022
    “…This project is about the study of evolutionary music, and focuses on the development of an algorithmic music composer using the Java programming language. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  2. 2

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The proposed method, XiFLEX has been implemented using two different techniques (java based & XQuery) and compared with the original FLEX algorithm in its basic implementation and the Apriori algorithm for frequent patterns generation. …”
    Get full text
    Get full text
    Thesis
  3. 3

    A Toolkit for Simulation of Desktop Grid Environment by FOROUSHAN, PAYAM CHINI

    Published 2014
    “…Core functionality of the simulator are job generation, volunteer generation, simulating algorithms, generating graphical charts and generating reports. …”
    Get full text
    Get full text
    Final Year Project
  4. 4

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…In addition, the randomness of the session key generated from the MLCG is verified using NIST test suite. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…An Intrusion Detection System is software or application which is used to detect thread, malicious activities and the unauthorized access to the computer system and warn the administrators by generating alarms. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Talkout : Protecting mental health application with a lightweight message encryption by Gavin Teo Juen

    Published 2022
    “…The project objectives includes:(i) To investigate lightweight message encryption algorithms by benchmarking their efficiency in terms of computation speed and generated cipher text size; (ii) To design and develop the TalkOut mobile application with lightweight message encryption by using prototype software development model.; and (iii) To evaluate the usability performance of the developed proposed TalkOut mobile application using System Usability Scale (SUS) approach. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  7. 7

    Web-based RIG performance reporting system using interactive visualization techniques / Amir Hambaly Nasaruddin by Nasaruddin, Amir Hambaly

    Published 2019
    “…The problem occurs when CoRe department needs to generate a report of RIG performance, they are using manual approaches. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Computer remote monitoring via mobile phones using socket programming / Samih Omer Fadlelmola Elkhider by Omer Fadlelmola Elkhider, Samih

    Published 2011
    “…Such methodology can be achieved by java programming language for mobile clients J2ME, and by using a second generation mobile phones. …”
    Get full text
    Get full text
    Thesis
  9. 9

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  10. 10
  11. 11
  12. 12

    An integrated model of automated elementary programming feedback using assisted and recommendation approach by Safei, Suhailan

    Published 2017
    “…Meanwhile, similar difficulty groups of the computer programs were generated using a K-Means clustering algorithm that was enhanced with ranking consideration. …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    Multi-objective pareto ant colony system based algorithm for generator maintenance scheduling by Shimailawi, Shatha Abdulhadi Muthana

    Published 2022
    “…The proposed models and algorithm can be used to solve the multi-objective GMS problem while the new parameters’ values can be used to obtain optimal or near optimal maintenance scheduling of generators. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    Contour generation for mask projection stereolithography 3D printing by Faeiz Azizi, Adnan

    Published 2019
    “…The proposed slicing algorithm uses line-plane intersection model to generate arbitrary line segment when it receives an STL facet. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Stereolithography 3D printing development of 3D printing machine controller using the predefined closest-distance volume interpolator system by -, -

    Published 2019
    “…The proposed slicing algorithm uses line-plane intersection model to generate arbitrary line segment when it receives an STL facet. …”
    Get full text
    Get full text
    Research Report
  16. 16

    Real-Time Video Processing Using Native Programming on Android Platform by Saipullah, Khairul Muzzammil

    Published 2012
    “…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17

    Automated Model Generation Algorithm for High Level Fault Modeling by Xia, Likun, Bell, Ian, Wilkinson, Antony

    Published 2010
    “…High level modeling (HLM) for operational amplifiers (opamps) has been previously carried out successfully using models generated by published automated model generation (AMG) approaches. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Contour generation algorithm for Projection Mask Stereolithography 3D printing process by Faeiz Azizi, Adnan, F. R. M., Romlay

    Published 2018
    “…The projections are generated from tessellated STL CAD model using contour generation algorithm that generates 2D contours as the projection mask. …”
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19

    Fuzzy Systems and Bat Algorithm for Exergy Modeling in a Gas Turbine Generator by Alemu Lemma, Tamiru, Mohd Hashim, Fakhruldin

    Published 2011
    “…The data for model training and validation are generated using semi-empirical models developed by the authors. …”
    Get full text
    Conference or Workshop Item
  20. 20

    Performance evaluation of real-time multiprocessor scheduling algorithms by Alhussian, H., Zakaria, N., Abdulkadir, S.J., Fageeri, S.O.

    Published 2016
    “…We hyave used the CPU profiler of Oracle JavaTM VisualVM to monitor the execution of LRE-TL as well as USG algorithms. …”
    Get full text
    Get full text
    Conference or Workshop Item