Search Results - (( basic integration ((new algorithm) OR (_ algorithm)) ) OR ( java application using algorithm ))
Search alternatives:
- basic integration »
- java application »
- using algorithm »
- new algorithm »
-
1
Application of genetic algorithm and JFugue in an evolutionary music generator
Published 2025“…This project explores the application of Genetic Algorithms (GA) with JFugue, which is a Java-based music programming library to develop an Evolutionary Music Generator. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
2
-
3
A hybrid algorithm based on artificial bee colony and artificial rabbits optimization for solving economic dispatch problem
Published 2023“…The new hybrid algorithm integrates the good features of both standard optimization strategies, thus producing better possible solutions. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
4
-
5
Utilizing of flower pollination algorithm for brushless DC motor speed controller
Published 2020“…If the PID controller is modified with a new algorithm, better results can be obtained from the BLDC motor. …”
Get full text
Get full text
Get full text
Proceeding Paper -
6
Design of nonlinear adaptive interaction algorithm controller for improvement of tracking performance of X-Y table ball screw drive system
Published 2023“…The contribution is Nonlinear Adaptive Interaction Algorithm (NAIA). The controller is developed based on the enhancement and modification of the basic Adaptive Interaction Algorithm Controller (AIA). …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
Fuzzy algorithm for 3D coastal gemorphology mapping by DInSAR
Published 2007“…The basic concept of fuzzy algorithm was used to filter DInSAR data. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
8
Development of automated neighborhood pattern sensitive faults syndrome generator for static random access memory
Published 2011“…This tool can be used to ease the process of developing a new March test algorithm for NPSF.…”
Get full text
Get full text
Thesis -
9
Algorithm-program visualization model : An intergrated software visualzation to support novices' programming comprehension
Published 2015“…Taking into account from those main issues, this study introduces the new model of integrated algorithm-program visualization (ALPROV) for developing program comprehension tool. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
10
-
11
A new 128-bit block cipher
Published 2009“…Towards that and after reviewing related research, in this research we propose to come up with a new 128-bit block cipher cryptographic algorithm which shall meet the security requirements. …”
Get full text
Get full text
Thesis -
12
Development an accurate and stable range-free localization scheme for anisotropic wireless sensor networks
Published 2022“…Accordingly, this study aspires to bridge the research gap by exploring a new DV-Hop algorithm to build a fast, costefficient, strong range-free localization scheme. …”
Get full text
Get full text
Thesis -
13
Website assurance monitoring application with MD5 Hashing and SHA-26 Algorithm / Abdullah Sani Abd Rahman and Samsiah Ahmad
Published 2022“…The Website Assurance Monitoring application has been developed based on MD5 hashing technique and SHA26 algorithm. By using Microsoft Visual Basic 6.0, the Graphical User Interfaces (GUIs) of the application to provide an easy or user-friendly monitoring application. …”
Get full text
Get full text
Get full text
Article -
14
Proposed fatigue index for the objective detection of muscle fatigue using surface electromyography and a double-step binary classifier
Published 2022“…This paper presents an algorithm that employs a new fatigue index for the objective detection of muscle fatigue using a double-step binary classifier. …”
Get full text
Get full text
Article -
15
A fuzzy case-based reasoning model for software requirements specifications quality assessment
Published 2023“…Additionally, for efficient cases retrieval in the CBR, relevant cases selection and nearest cases selection heuristic search algorithms are used in the system. Basically, the input to the relevant cases algorithm is the available cases in the system case base and the output is the relevant cases. …”
Article -
16
-
17
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
18
-
19
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…Web service technology defines several supporting protocols and specifications such as SOAP and WSDL for communication with client and server for data interchange. A new architectural paradigm has emerged in SOA in recent years called REpresentational State Transfer (REST) that is also used to integrate loosely coupled service components, named RESTful web services, by system integration consortiums. …”
Get full text
Get full text
Article -
20
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…Web service technology defines several supporting protocols and specifications such as SOAP and WSDL for communication with client and server for data interchange. A new architectural paradigm has emerged in SOA in recent years called REpresentational State Transfer (REST) that is also used to integrate loosely coupled service components, named RESTful web services, by system integration consortiums. …”
Get full text
Get full text
Article
