Search Results - (( desktop computing using algorithm ) OR ( java application based algorithm ))

Refine Results
  1. 1
  2. 2

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
    Get full text
    Get full text
    Final Year Project
  3. 3
  4. 4
  5. 5

    Application of genetic algorithm and JFugue in an evolutionary music generator by Tang, Jia Rou

    Published 2025
    “…This project explores the application of Genetic Algorithms (GA) with JFugue, which is a Java-based music programming library to develop an Evolutionary Music Generator. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  6. 6
  7. 7
  8. 8
  9. 9

    Real-Time Video Processing Using Native Programming on Android Platform by Saipullah, Khairul Muzzammil

    Published 2012
    “…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10
  11. 11
  12. 12

    Real-time algorithmic music composition application. by Yap, Alisa Yi Hui

    Published 2022
    “…This project is about the study of evolutionary music, and focuses on the development of an algorithmic music composer using the Java programming language. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  13. 13

    Optimization of ANPR algorithm on android mobile phone by Mutholib, Abdul, Gunawan, Teddy Surya, Chebil, Jalel, Kartiwi, Mira

    Published 2013
    “…In previous researches, many researchers are used a high end desktop PC and high resolution camera to implement the ANPR system. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  14. 14
  15. 15

    Embedded vision system development using 32-bit Single Board Computer and GNU/Linux by Nur Farhan, Kahar

    Published 2011
    “…The main component for Embedded Vision System hardware design is an x86 TS5500 Single Board Computer (SBC), Logitech QuickCam Pro 4000 webcam, compact flash memory card, PCMCIA wireless network card, and a Desktop PC. …”
    Get full text
    Thesis
  16. 16
  17. 17

    Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework by Asaad Aref, Ibrahim

    Published 2004
    “…A design proposal was outlined to provide an adaptive client/server approach to stream audio contents using Real-Time Transport Protocol (RTP) involving architecture based on the Java Media Framework (JMF) Application Programmable Interfaces (API).RTP protocol is the Internet-standard protocol for the transport of real-time data, including audio and video and can be implemented by using Java Media Framework (JMF). …”
    Get full text
    Get full text
    Thesis
  18. 18

    Development of GPU-based visual environment for metamaterials design by Mezhuyev, Vitaliy, Mohammed, Muamer N., Mohd Arfian, Ismail, Mohamad Fadli, Zolkipli

    Published 2018
    “…Paper describes a new version of Visual Environment for Metamaterials Modelling (VEM2), which implements algorithms of computation of physical properties of metamaterials using GPUs of a desktop computer. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Outdoor marker-less tracking and pose calculating system for mobile augmented reality by Rehman, Ullah Khan

    Published 2014
    “…This thesis also proposes an algorithm for pose estimation using homography and investigates the use of static database in smart-phones so as to bypass the need of a desktop server. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Improve cloud computing security using RSA encryption with Fermat's little theorem by Mohamed Shereek, Balkees, Muda, Zaiton, Yasin, Sharifah

    Published 2014
    “…Encryption is the one of the most secured way using prevent unauthorized access. Hence we provide a new method for Cloud Computing Security by applying RSA algorithm and Fermat's theorem together. …”
    Get full text
    Get full text
    Get full text
    Article