Search Results - (( ((program using) OR (problem using)) context algorithm ) OR ( java application use algorithm ))

Refine Results
  1. 1

    Web-based RIG performance reporting system using interactive visualization techniques / Amir Hambaly Nasaruddin by Nasaruddin, Amir Hambaly

    Published 2019
    “…D3.js is used as a technology to visualize the result in interactive form or dynamic visualization which is a JavaScript library and Python is a language to program the system. …”
    Get full text
    Get full text
    Thesis
  2. 2

    A comparative study of greedy algorithms and dynamic programming in road network / Nuralya Sofea Hairulanuar by Hairulanuar, Nuralya Sofea

    Published 2024
    “…Dijkstra's algorithm and A* algorithm have been shown to be very efficient for solving single-source shortest route problems. …”
    Get full text
    Get full text
    Thesis
  3. 3

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  4. 4
  5. 5
  6. 6

    LCSS-Based Algorithm for Computing Multivariate Data Set Similarity: A Case Study of Real-Time WSN Data by Khan, Rahim, Ali, Ihsan, Altowaijri, Saleh, Zakarya, Muhammad, Rahman, Atiq Ur, Ahmedy, Ismail, Khan, Anwar, Gani, Abdullah

    Published 2019
    “…The proposed algorithm performs exceptionally well on numerous multivariate data sets compared with the classical dynamic programming-based algorithms. …”
    Get full text
    Get full text
    Article
  7. 7

    Real-Time Video Processing Using Native Programming on Android Platform by Saipullah, Khairul Muzzammil

    Published 2012
    “…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    Providing Ubiquitous Positioning Using Context Aware Handover Algorithm by Khan, Mohammod Sazid Zaman

    Published 2012
    “…This research alms to solve the problem of ubiquitous positioning by designing a context aware handover algorithm for positioning systems. …”
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10

    Real-time algorithmic music composition application. by Yap, Alisa Yi Hui

    Published 2022
    “…This project is about the study of evolutionary music, and focuses on the development of an algorithmic music composer using the Java programming language. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  11. 11

    Performance evaluation of real-time multiprocessor scheduling algorithms by Alhussian, H., Zakaria, N., Abdulkadir, S.J., Fageeri, S.O.

    Published 2016
    “…We hyave used the CPU profiler of Oracle JavaTM VisualVM to monitor the execution of LRE-TL as well as USG algorithms. …”
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12
  13. 13

    Application of genetic algorithm and JFugue in an evolutionary music generator by Tang, Jia Rou

    Published 2025
    “…This project explores the application of Genetic Algorithms (GA) with JFugue, which is a Java-based music programming library to develop an Evolutionary Music Generator. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  14. 14

    Development of a new approach for deterministic supply chain network design by Bidhandi, Hadi Mohammadi, Mohd. Yusuff, Rosnah, Megat Ahmad, Megat Mohamad Hamdan, Abu Bakar, Mohd Rizam

    Published 2008
    “…This paper proposes a mixed integer linear programming model and solution algorithm for solving supply chain network design problems in deterministic, multi-commodity, single-period contexts. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15
  16. 16

    Implementation of hashed cryptography algorithm based on cryptography message syntax by Ali, Mohammed Ahnaf

    Published 2019
    “…This design and simulation research is conducted in CMC network security (message encryption context). The design will use MATLAB encryption to show simulation. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    User authentication in public cloud computing through adoption of electronic personal synthesis behavior by Mohanaad Talal Shakir

    Published 2023
    “…Secondly, a questionnaire prepared to examine the acceptance and use of EPSB. Finally, the implemented algorithm tested by comparing the accuracy of the current authentication framework with and without an EPSB algorithm. …”
    text::Thesis
  18. 18

    Route Optimization System by Zulkifli, Abdul Hayy

    Published 2005
    “…The method used to develop this project is Rapid Application Development (RAD). …”
    Get full text
    Get full text
    Final Year Project
  19. 19

    Defining fitness function for search based assessment of grammar reachability by Umar, Kabir, Md Sultan, Abu Bakar, Zulzalil, Hazura, Admodisastro, Novia Indriaty, Abdullah @ Selimun, Mohd Taufik

    Published 2018
    “…The reformulation efforts could be extended by reformulating such problems as Search Based CFG reachability problems, addressable using search algorithms, such as Evolutionary Programming (EP). …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    A multi-layer dimension reduction algorithm for text mining of news in forex / Arman Khadjeh Nassirtoussi by Nassirtoussi, Arman Khadjeh

    Published 2015
    “…The major finding of this review is that context-specific text mining algorithms are lacking. …”
    Get full text
    Get full text
    Thesis