Search Results - (( java application using algorithm ) OR ( user generation using algorithm ))
Search alternatives:
- java application »
- generation using »
- using algorithm »
- user generation »
-
1
Real-time algorithmic music composition application.
Published 2022“…This project is about the study of evolutionary music, and focuses on the development of an algorithmic music composer using the Java programming language. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
2
Application of genetic algorithm and JFugue in an evolutionary music generator
Published 2025“…Music that has been generated using JFugue involves real-time generation and user-driven evolution. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
3
Route Optimization System
Published 2005“…The method used to develop this project is Rapid Application Development (RAD). …”
Get full text
Get full text
Final Year Project -
4
Securing cloud data system (SCDS) for key exposure using AES algorithm
Published 2021“…The website tested by many users that use to register and upload them own data and files using them own e-mails and the unique key that generated after completing the registration. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
5
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…The process begins through the monitoring of plants using sensors connected to the Arduino device. Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. …”
Get full text
Get full text
Get full text
Article -
6
Web-based RIG performance reporting system using interactive visualization techniques / Amir Hambaly Nasaruddin
Published 2019“…The problem occurs when CoRe department needs to generate a report of RIG performance, they are using manual approaches. …”
Get full text
Get full text
Thesis -
7
Talkout : Protecting mental health application with a lightweight message encryption
Published 2022“…The project objectives includes:(i) To investigate lightweight message encryption algorithms by benchmarking their efficiency in terms of computation speed and generated cipher text size; (ii) To design and develop the TalkOut mobile application with lightweight message encryption by using prototype software development model.; and (iii) To evaluate the usability performance of the developed proposed TalkOut mobile application using System Usability Scale (SUS) approach. …”
Get full text
Get full text
Get full text
Academic Exercise -
8
Secure scheme for user authentication and authorization in android environment
Published 2013“…Keeping in viewpoint of security on effective authentication and authorization, this paper proposes a technique that exponentially minimizes the operational cost by using secure hash algorithms that has the potential to generate mobile-based One Time Passwords (OTPs) scheme on Android environment ensuring enhanced protection with respect to password security. …”
Get full text
Get full text
Get full text
Article -
9
Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption
Published 2022“…The selected lightweight geo-encryption algorithm will be implemented in the proposed system, vi which develops by using Java language. …”
Get full text
Get full text
Get full text
Academic Exercise -
10
Smart student timetable planner
Published 2025“…The system is implemented using Node.js with Express for server-side development, HTML, CSS, and JavaScript for the frontend, and Socket.IO for real-time collaboration. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
11
-
12
Volunteer Management System
Published 2012“…The project will adopt the Iterative and incremental development methodology, which promotes constant reevaluation, and will be built on the java programming language and developed on the Netbeans IDE, for the GUI and algorithm implementation. …”
Get full text
Get full text
Final Year Project -
13
Dynamic force-directed graph with weighted nodes for scholar network visualization
Published 2022“…The approach is realized by creating a web-based interface using D3 JavaScript algorithm that allows the visualization to focus on how data are connected to each other more accurately than the conventional lines of data seen in traditional data representation. …”
Get full text
Get full text
Article -
14
Enhance key generation algorithm based user string identity as public key
Published 2015“…This algorithm uses a user’s identity to replace the numbers that are used as a public key in the RSA algorithm. …”
Get full text
Get full text
Thesis -
15
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
16
-
17
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
18
Enhancement of RSA Key Generation Using Identity
Published 2015“…This algorithm used user’s identity to replace the numbers that are used as a public key in the RSA algorithm. …”
Get full text
Get full text
Get full text
Book Chapter -
19
VISUALIZATION OF GENETIC ALGORITHM BASED ON 2-D GRAPH TO ACCELERATE THE SEARCHING WITH HUMAN INTERVENTIONS.
Published 2012“…Individuals for the next generation are selected by using the objective function. …”
Get full text
Get full text
Thesis -
20
Mobile game application development using evolutionary algorithms
Published 2014“…Since it involves human users, adding Interactive Evolutionary Algorithm (IEA) together with EP has allowed further rules to be generated that are based on the user’s preferences. …”
Get full text
Get full text
Get full text
Thesis
