Search Results - (( java application using algorithm ) OR ( variables reduction data algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2
  3. 3
  4. 4

    Real-Time Video Processing Using Native Programming on Android Platform by Saipullah, Khairul Muzzammil

    Published 2012
    “…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5
  6. 6

    Real-time algorithmic music composition application. by Yap, Alisa Yi Hui

    Published 2022
    “…This project is about the study of evolutionary music, and focuses on the development of an algorithmic music composer using the Java programming language. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  7. 7

    Performance evaluation of real-time multiprocessor scheduling algorithms by Alhussian, H., Zakaria, N., Abdulkadir, S.J., Fageeri, S.O.

    Published 2016
    “…We hyave used the CPU profiler of Oracle JavaTM VisualVM to monitor the execution of LRE-TL as well as USG algorithms. …”
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8
  9. 9

    Application of genetic algorithm and JFugue in an evolutionary music generator by Tang, Jia Rou

    Published 2025
    “…This project explores the application of Genetic Algorithms (GA) with JFugue, which is a Java-based music programming library to develop an Evolutionary Music Generator. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  10. 10
  11. 11

    Route Optimization System by Zulkifli, Abdul Hayy

    Published 2005
    “…The method used to develop this project is Rapid Application Development (RAD). …”
    Get full text
    Get full text
    Final Year Project
  12. 12

    Hyper-heuristic approaches for data stream-based iIntrusion detection in the Internet of Things by Hadi, Ahmed Adnan

    Published 2022
    “…The experimental results showed that the accuracy of the algorithm over the NSL-KDD dataset was 99.72%, with a memory reduction of 10%. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Optimizing lossless compression by normalized data length in Huffman Algorithm by Tonny, Hidayat

    Published 2022
    “…Huffman Algorithms is currently still very effective at compressing 8-bit data, which can be grouped into Static, Dynamic, and Adaptive extensions, however its performance cannot be determined if it is performed on data that has several variables and probabilities. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    Cleansing of inconsistent sample in linear regression model based on rough sets theory by Rasyidah, Rasyidah, Efendi, Riswan, Mohd. Nawi, Nazri, Mat Derisf, Mustafa, Aqil Burney, S.M.

    Published 2023
    “…In the implementation, these aspects also performed better than before data reduction. The results from both simulations and implementations demonstrate that the data reduction of rough sets is a viable strategy in cleansing of the inconsistent samples in the linear regression models. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Cleansing of inconsistent sample in linear regression model based on rough sets theory by Rasyidah, Rasyidah, Efendi, Riswan, Mohd. Nawi, Nazri, Mat Deris, Mustafa, Burney, S.M.Aqil

    Published 2023
    “…In the implementation, these aspects also performed better than before data reduction. The results from both simulations and implementations demonstrate that the data reduction of rough sets is a viable strategy in cleansing of the inconsistent samples in the linear regression models. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Cleansing of inconsistent sample in linear regression model based on rough sets theory by Rasyidah, Rasyidah, Efendi, Riswan, Mohd. Nawi, Nazri, Mat Deris, Mustafa, Aqil Burney, S.M.

    Published 2023
    “…In the implementation, these aspects also performed better than before data reduction. The results from both simulations and implementations demonstrate that the data reduction of rough sets is a viable strategy in cleansing of the inconsistent samples in the linear regression models. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Cleansing of inconsistent sample in linear regression model based on rough sets theory by Rasyidah, Rasyidah, Riswan Efendi, Riswan Efendi, Mohd. Nawi, Nazri, Mat Deris, Mustafa, Aqil Burney, S.M.

    Published 2023
    “…In the implementation, these aspects also performed better than before data reduction. The results from both simulations and implementations demonstrate that the data reduction of rough sets is a viable strategy in cleansing of the inconsistent samples in the linear regression models. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    A Comparative Analysis of Peak Load Shaving Strategies for Isolated Microgrid Using Actual Data by Rana, M.M., Rahman, A., Uddin, M., Sarkar, M.R., Shezan, S.A., Ishraque, M.F., Rafin, S.M.S.H., Atef, M.

    Published 2022
    “…Actual variable load data and PV generation data are considered to conduct the simulation case studies which are col-lected from a real IMG system. …”
    Get full text
    Get full text
    Article
  19. 19

    A hybridisation of adaptive variable neighbourhood search and large neighbourhood search: Application to the vehicle routing problem by Sze, Jeeu Fong, Salhi, S., Wassan, N.

    Published 2016
    “…In addition, the hybridisation of LNS with the AVNS enables the solution to escape from the local minimum effectively. To make the algorithm more competitive in terms of the computing time, a simple and flexible data structure and a neighbourhood reduction scheme are embedded. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…Diffie-Hellman algorithm is used to determine the pixel on an image that will be used to store the message. …”
    Get full text
    Get full text
    Conference or Workshop Item