Search Results - (( developing process efficient algorithm ) OR ( java application service algorithm ))
Search alternatives:
- application service »
- developing process »
- process efficient »
- service algorithm »
- java application »
-
1
Mathematical simulation for 3-dimensional temperature visualization on open source-based grid computing platform
Published 2009“…The development of this architecture is based on several programming language as it involves algorithm implementation on C, parallelization using Parallel Virtual Machine (PVM) and Java for web services development. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
2
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis -
3
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
4
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
5
A filtering algorithm for efficient retrieving of DNA sequence
Published 2009“…An automaton-based algorithm is used to develop the filtering process proposed. …”
Get full text
Get full text
Get full text
Article -
6
Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework
Published 2004“…A design proposal was outlined to provide an adaptive client/server approach to stream audio contents using Real-Time Transport Protocol (RTP) involving architecture based on the Java Media Framework (JMF) Application Programmable Interfaces (API).RTP protocol is the Internet-standard protocol for the transport of real-time data, including audio and video and can be implemented by using Java Media Framework (JMF). …”
Get full text
Get full text
Thesis -
7
-
8
Pengesan lalu lintas dengan kaedah pemerosesan imej
Published 2001“…This study was conducted to develop efficient traffic detector using image-processing with a personal compute I: Traffic images were captured using ordinary analogue video camera and digitised using a video blastel: Four algorithms were developed i. e. algorithm for traffic counting, algorithm for vehicle classification. algorithm to determine the speed of the counted vehicles and algorithm for incident detection. …”
Get full text
Get full text
Article -
9
Development of fault detection, diagnosis and control system identification using multivariate statistical process control (MSPC)
Published 2006“…In this research work, an FDD algorithm is developed using MSPC and correlation coefficients between process variables. …”
Get full text
Get full text
Monograph -
10
An efficient real-time terrain data organization and visualization algorithm based on enhanced triangle-based level of detail technique
Published 2006“…The purpose of this research is to design, develop and implement an algorithm for enhancing the rendering efficiency of triangle-based LOD technique. …”
Get full text
Get full text
Thesis -
11
Simulation of shortest path using a-star algorithm / Nurul Hani Nortaja
Published 2004“…The development process for this simulation is using programming language of Microsoft Visual C I t 6.0 and the coding creation depends on the algorithm flowchart and the formula pseudocode. …”
Get full text
Get full text
Thesis -
12
Hybrid scheduling and dual queue scheduling
Published 2009“…Our research work involves the design and development of new CPU scheduling algorithms (the Hybrid Scheduling Algorithm and the Dual Queue Scheduling Algorithm) with a view to optimization. …”
Get full text
Get full text
Conference or Workshop Item -
13
Talkout : Protecting mental health application with a lightweight message encryption
Published 2022“…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
Get full text
Get full text
Get full text
Academic Exercise -
14
An augmented reality real-time cloud-based remote monitoring algorithm for a manufacturing system / Siti Aisyah Jaafar
Published 2021“…The efficiency was analysed in terms of time delay in data transfer between two mediums during the monitoring process, which were the actual and the virtual conveyor process. …”
Get full text
Get full text
Thesis -
15
Performance-aware cost-effective brokering and load balancing algorithms for data center in large scale cloud computing
Published 2015“…Further we developed Load Aware algorithm which minimizes average DC processing time and maximum DC processing time by 73% and 49% respectively. …”
Get full text
Get full text
Thesis -
16
Extracting feature from images by using K-Means clustering algorithm / Abdul Hakim Zainal Abidin
Published 2016“…This research purposed clustering algorithm to improve process extracting feature in images to get meaningful information because it can speed up the time to process of extracting meaningful information in images due to the efficient of the algorithm that has high performance to process the image. …”
Get full text
Get full text
Thesis -
17
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…A GUI is created in a form of JAVA application to display data detected from tag. …”
Get full text
Get full text
Thesis -
18
-
19
Enhancing Harmony Search Metaheuristic Algorithm for Coverage Efficiency, Test Suite Reduction, and Running Time in Combinatorial Interaction Testing
Published 2025“…Optimization has developed powerful algorithms for solving complex problems efficiently. …”
Get full text
Get full text
Article -
20
Enhance efficiency of answering XML keyword query using incompact structure of MCCTree
Published 2012“…If the result cannot be used directly by the ranking method, the algorithm has an ineffective process. Moreover, if the ineffective process requires re-examining the original tree, the efficiency of the process of the algorithm will be reduced. …”
Get full text
Get full text
Thesis
