Search Results - (( wave evaluation a algorithm ) OR ( java application using algorithm ))
Search alternatives:
- java application »
- wave evaluation »
- using algorithm »
- evaluation a »
- a algorithm »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
-
3
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
4
Evaluation of lightning location and lightning current wave shape using measured lightning magnetic fields at two stations
Published 2016“…In this paper, an algorithm is proposed to evaluate a lightning location as well as the lightning current wave shapes at different heights along a channel using lightning measured magnetic fields at two stations. …”
Get full text
Get full text
Conference or Workshop Item -
5
-
6
Real-Time Video Processing Using Native Programming on Android Platform
Published 2012“…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
7
Detection of tube defect using the autoregressive algorithm
Published 2015“…The variation in stress wave propagation was captured by a high frequency sensor. …”
Get full text
Get full text
Get full text
Get full text
Article -
8
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
9
A deterministic approach for finding the T onset parameter of flatten T wave in ECG
Published 2019“…By using the R peak value as a fiducial point and considering the last interval of RR interval instead of complete T wave alternans detection algorithm (TWA) for determination the T on parameter of Flatten T wave. …”
Get full text
Get full text
Article -
10
Real-time algorithmic music composition application.
Published 2022“…This project is about the study of evolutionary music, and focuses on the development of an algorithmic music composer using the Java programming language. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
11
Performance evaluation of real-time multiprocessor scheduling algorithms
Published 2016“…We hyave used the CPU profiler of Oracle JavaTM VisualVM to monitor the execution of LRE-TL as well as USG algorithms. …”
Get full text
Get full text
Conference or Workshop Item -
12
Optimization of blood vessel detection in retina images using multithreading and native code for portable devices
Published 2013Get full text
Get full text
Conference or Workshop Item -
13
Application of genetic algorithm and JFugue in an evolutionary music generator
Published 2025“…This project explores the application of Genetic Algorithms (GA) with JFugue, which is a Java-based music programming library to develop an Evolutionary Music Generator. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
14
-
15
-
16
Route Optimization System
Published 2005“…The method used to develop this project is Rapid Application Development (RAD). …”
Get full text
Get full text
Final Year Project -
17
Detection of defect in concrete using elastic wave tomography reconstruction technique / Liu Kit Fook
Published 2017“…Non-destructive evaluation (NDE) and structural health monitoring (SHM) methods have become a vital technology in civil engineering industry. …”
Get full text
Get full text
Thesis -
18
Evaluation of lightning return stroke current using measured electromagnetic fields
Published 2012“…This research proposed an inverse procedure algorithm using the proposed general fields’ expressions and the particle swarm optimization algorithm (PSO) in the time domain where the full channel base current wave shape in time domain can be determined. …”
Get full text
Get full text
Thesis -
19
Iterative And Single-Step Solutions Of Two Dimensional Time-Domain Inverse Scattering Problem Featuring Ultra Wide Band Sensors
Published 2010“…First, the algorithms‘ performances were evaluated using numerical simulation employing two different scanning geometries: limited and full view scanning geometries, where the applicability of these algorithms was accessed by comparing the reconstructed images with actual model. …”
Get full text
Get full text
Thesis -
20
Secure Image Steganography Using Encryption Algorithm
Published 2016“…Diffie-Hellman algorithm is used to determine the pixel on an image that will be used to store the message. …”
Get full text
Get full text
Conference or Workshop Item
