Search Results - (( developing systematic path algorithm ) OR ( java application based algorithm ))

Refine Results
  1. 1

    Meta-Heuristic Algorithms for Learning Path Recommender at MOOC by Son, N.T., Jaafar, J., Aziz, I.A., Anh, B.N.

    Published 2021
    “…We have developed Metaheuristic algorithms includes the Genetic Algorithm (GA) and Ant Colony Optimization Algorithm (ACO), to solve the proposed model. …”
    Get full text
    Get full text
    Article
  2. 2

    Modeling of cardiovascular diseases (CVDs) and development of predictive heart risk score by Mirza Rizwan, Sajid

    Published 2021
    “…The purpose of this study is two folds such as the development of a statistically valid path model which considered the possible non-linear paths, mediators, and binary endogenous feature of CVDs status. …”
    Get full text
    Get full text
    Thesis
  3. 3

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
    Get full text
    Get full text
    Final Year Project
  4. 4

    Modelling Autonomous Evacuation Navigation System (AENS) for optimal route using Dijkstra's algorithm by Abu Samah, Khyrina Airin Fariza

    Published 2016
    “…Through ST adaptation, all subsystems were integrated and using the “Dijkstra’s algorithm” (DA) by modifying its function from shortest path algorithm to safest and shortest algorithm, to the nearest exit. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    Test case generation from state machine with OCL constraints using search-based techniques / Aneesa Ali Ali Saeed by Aneesa Ali, Ali Saeed

    Published 2017
    “…One contribution of this thesis is developing an efficient technique for detecting automatically infeasible paths that contain transitions with conflicted OCL constraints. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    Time-Uncertainty Analysis by Using Simulation in Project Scheduling Networks by Mohammed Omer, Anwar

    Published 1999
    “…Using simulation now validates this statement. (5) The computation error of a project likelihood completion date is less than 10 percent if a path of a float greater than twice the larger standard deviation of this mentioned path and the critical path is dropped from the calculation, and (6) An effective risk response framework is introduced to help contractors systematically manage the risk in scheduling their projects.…”
    Get full text
    Get full text
    Thesis
  8. 8

    Application of genetic algorithm and JFugue in an evolutionary music generator by Tang, Jia Rou

    Published 2025
    “…This project explores the application of Genetic Algorithms (GA) with JFugue, which is a Java-based music programming library to develop an Evolutionary Music Generator. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  9. 9
  10. 10

    Development of a systematic method in lean tool selection for automotive industry by Anvari, Alireza

    Published 2012
    “…The developed software probably assists manufacturers in applying the systematic lean tool selection. …”
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12

    Real-Time Video Processing Using Native Programming on Android Platform by Saipullah, Khairul Muzzammil

    Published 2012
    “…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13
  14. 14

    Real-time algorithmic music composition application. by Yap, Alisa Yi Hui

    Published 2022
    “…This project is about the study of evolutionary music, and focuses on the development of an algorithmic music composer using the Java programming language. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  15. 15

    Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework by Asaad Aref, Ibrahim

    Published 2004
    “…A design proposal was outlined to provide an adaptive client/server approach to stream audio contents using Real-Time Transport Protocol (RTP) involving architecture based on the Java Media Framework (JMF) Application Programmable Interfaces (API).RTP protocol is the Internet-standard protocol for the transport of real-time data, including audio and video and can be implemented by using Java Media Framework (JMF). …”
    Get full text
    Get full text
    Thesis
  16. 16

    Collision avoidance mechanisms using artificial potential field for UAVs by Abdul Azis, Fadilah, Tan, Jie Sim, Md Ghazaly, Mariam, Mohamad Hanif, Noor Hazrin Hany

    Published 2025
    “…The developed simulation framework serves as a reproducible platform for benchmarking and future algorithmic extensions. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    A Toolkit for Simulation of Desktop Grid Environment by FOROUSHAN, PAYAM CHINI

    Published 2014
    “…The selected methodology for the application development is based on prototyping methodology. …”
    Get full text
    Get full text
    Final Year Project
  18. 18

    A Review: Current Trend of Immersive Technologies for Indoor Navigation and the Algorithms by Sariman, Muhammad Shazmin, Othman, Maisara, Mat Akir, Rohaida, Mahamad, Abd Kadir, Ab Rahman, Munirah

    Published 2024
    “…However, a fair evaluation and comparison of indoor navigation algorithms have not been discussed further. This paper presents a comprehensive review of collective algorithms developed for indoor navigation. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19
  20. 20

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item