Search Results - (( java application using algorithm ) OR ( model mitigating based algorithm ))
Search alternatives:
- java application »
- mitigating based »
- using algorithm »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
-
3
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
4
Real-Time Video Processing Using Native Programming on Android Platform
Published 2012“…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
6
A novel peak shaving algorithm for islanded microgrid using battery energy storage system
Published 2020“…Effectiveness of the proposed algorithm was tested with a BESS-based MATLAB/Simulink model of an actual microgrid under realistic load conditions which were recorded. …”
Get full text
Get full text
Article -
7
A novel peak shaving algorithm for islanded microgrid using battery energy storage system
Published 2020“…Effectiveness of the proposed algorithm was tested with a BESS-based MATLAB/Simulink model of an actual microgrid under realistic load conditions which were recorded. …”
Get full text
Get full text
Article -
8
Real-time algorithmic music composition application.
Published 2022“…This project is about the study of evolutionary music, and focuses on the development of an algorithmic music composer using the Java programming language. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
9
Resource allocation techniques for interference mitigation in macro and femtocell heterogeneous network-based LTE system
Published 2017“…The second proposed interference mitigation technique is a full frequency reuse termed as Resource Allocation based Cuckoo Search Algorithm (RACSA). …”
Get full text
Get full text
Get full text
Thesis -
10
Performance evaluation of real-time multiprocessor scheduling algorithms
Published 2016“…We hyave used the CPU profiler of Oracle JavaTM VisualVM to monitor the execution of LRE-TL as well as USG algorithms. …”
Get full text
Get full text
Conference or Workshop Item -
11
Optimization of blood vessel detection in retina images using multithreading and native code for portable devices
Published 2013Get full text
Get full text
Conference or Workshop Item -
12
Application of genetic algorithm and JFugue in an evolutionary music generator
Published 2025“…This project explores the application of Genetic Algorithms (GA) with JFugue, which is a Java-based music programming library to develop an Evolutionary Music Generator. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
13
-
14
A coalition model for efficient indexing in wireless sensor network with random mobility / Hazem Jihad Ali Badarneh
Published 2021“…The proposed model consists of Dynamic-Coalition framework, Static-Coalition algorithm, and Coalition-Based Index-Tree framework. …”
Get full text
Get full text
Get full text
Thesis -
15
Route Optimization System
Published 2005“…The method used to develop this project is Rapid Application Development (RAD). …”
Get full text
Get full text
Final Year Project -
16
Data-driven continuous-time Hammerstein modeling with missing data using improved Archimedes optimization algorithm
Published 2024“…This research introduces the improved Archimedes optimization algorithm (IAOA) for data-driven modeling of continuous-time Hammerstein models with missing data. …”
Get full text
Get full text
Get full text
Article -
17
Efficient ML technique in blockchain-based solution in carbon credit for mitigating greenwashing
Published 2025“…The rapid growth of carbon credit markets, driven by global efforts to mitigate climate change, highlights the critical need for transparency and accountability—particularly in forest-based carbon offset projects. …”
Get full text
Get full text
Get full text
Article -
18
Water level prediction using various machine learning algorithms: a case study of Durian Tunggal river, Malaysia
Published 2023“…In this study, six different Machine Learning (ML) algorithms were developed to predict the river�s water level, on a daily basis based on collected data from 1990 to 2019 which were used to train and test the proposed models. …”
Article -
19
Predicting building damage grade by earthquake: a Bayesian Optimization-based comparative study of machine learning algorithms
Published 2024“…This study compares Bayesian Optimization-based machine learning systems that anticipate earthquake-damaged buildings and to evaluates building damage classification models. …”
Get full text
Get full text
Article -
20
Secure Image Steganography Using Encryption Algorithm
Published 2016“…Diffie-Hellman algorithm is used to determine the pixel on an image that will be used to store the message. …”
Get full text
Get full text
Conference or Workshop Item
