Search Results - (( basic generation method algorithm ) OR ( java application need algorithm ))

Refine Results
  1. 1

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The implementation details shows the difference in accessing and manipulating XML v documents using java based parsers and query languages for XML and the steps needed to access an XML document until we produce a list of association rules . The proposed method, XiFLEX has been implemented using two different techniques (java based & XQuery) and compared with the original FLEX algorithm in its basic implementation and the Apriori algorithm for frequent patterns generation. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Real-Time Video Processing Using Native Programming on Android Platform by Saipullah, Khairul Muzzammil

    Published 2012
    “…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3
  4. 4

    Data depublication using : Hashing algorithm / Naimah Nayan by Nayan, Naimah

    Published 2019
    “…The hash value is generated by using hashing algorithm such as Message Digest 5 (MD5) and Secure Hashing Algorithm 1 (SHA-1). …”
    Get full text
    Get full text
    Thesis
  5. 5

    Application of genetic algorithm and JFugue in an evolutionary music generator by Tang, Jia Rou

    Published 2025
    “…This project explores the application of Genetic Algorithms (GA) with JFugue, which is a Java-based music programming library to develop an Evolutionary Music Generator. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  6. 6

    Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework by Asaad Aref, Ibrahim

    Published 2004
    “…A design proposal was outlined to provide an adaptive client/server approach to stream audio contents using Real-Time Transport Protocol (RTP) involving architecture based on the Java Media Framework (JMF) Application Programmable Interfaces (API).RTP protocol is the Internet-standard protocol for the transport of real-time data, including audio and video and can be implemented by using Java Media Framework (JMF). …”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8
  9. 9

    Algorithm development for optimization of a refrigeration system by Izzat, Mohamad Adnan

    Published 2010
    “…The thesis describes the step by step the method to find an algorithm by using experimental data. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  10. 10

    Network game (Literati) / Chung Mei Kuen by Chung, Mei Kuen

    Published 2003
    “…Therefore, efficient and robust servers that process separate client connections in separate threads are needed. Java applet is a well-known and widely used example of mobile code (a variation on the traditional client-server model). …”
    Get full text
    Get full text
    Thesis
  11. 11

    Optimal power flow based on fuzzy linear programming and modified Jaya algorithms by Alzihaymee, Warid Sayel Warid

    Published 2017
    “…Meanwhile, the proposed QOJaya algorithm produces better results than the basic Jaya method in terms of solution optimality and convergence speed. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Ant colony optimization for solving economic dispatch of power system: article / Muhammad Shukri Che Hashim by Che Hashim, Muhammad Shukri

    Published 2009
    “…An economic dispatch problem, consisting of six generating units is applied to compare the performance of the proposed method with those of genetic algorithm (GA) and simulated annealing (SA). …”
    Get full text
    Get full text
    Article
  13. 13

    Ant colony optimization for solving economic dispatch of power system / Muhammad Shukri Che Hashim by Che Hashim, Muhammad Shukri

    Published 2009
    “…An economic dispatch problem, consisting of six generating units is applied to compare the performance of the proposed method with those of genetic algorithm (GA) and simulated annealing (SA). …”
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15

    Backtracking search algorithm for optimal power dispatch in power system / Mostafa Modiri Delshad by Mostafa, Modiri Delshad

    Published 2016
    “…The main objectives of the power dispatch problem are to minimize the generation cost and emission amount of generators as well as to meet the power demand. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Penggunaan penggugusan subtraktif bagi menjana peraturan kabur by Agus Priyono, Muhammad Ridwan, Ahmad Jais Alias, Riza Atiq O. K. Rahmat, Azmi Hassan, Mohd. Alauddin Mohd. Ali

    Published 2005
    “…By using the fuzzy clustering algorithm, membership function could be counted based on two possible clustering methods. …”
    Get full text
    Get full text
    Article
  17. 17
  18. 18

    Knowledge-based genetic algorithm for multidimensional data clustering by Purnomo, Muhammad Ridwan Andi, Saleh, Chairul, Lagaida, R.L., Hassan, Azmi

    Published 2013
    “…Basically, this method adopts knowledge of what called as appropriate cluster centre for a fixed number of k-cluster. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  19. 19

    Mathematical formulation of tabu search in combinatorial optimization by Ismail, Zuhaimy

    Published 2008
    “…CARP is known to be Non-deterministic Polynomialtime hard (NP-hard) where solutions are obtained through heuristic methods. Tabu Search (TS) is a heuristic method based on the use of prohibition-based techniques and basic heuristics algorithms like local search. …”
    Get full text
    Get full text
    Monograph
  20. 20

    Model of Improved a Kernel Fast Learning Network Based on Intrusion Detection System by Ali, Mohammed Hasan, Mohamed Fadli, Zolkipli

    Published 2019
    “…As network attackers keep changing their methods of attack execution to evade the deployed intrusion-detection systems (IDS), machine learning (ML) algorithms have been introduced to boost the performance of the IDS. …”
    Get full text
    Get full text
    Conference or Workshop Item