Search Results - (( developing using mead algorithm ) OR ( java application model algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6

    Real-time algorithmic music composition application. by Yap, Alisa Yi Hui

    Published 2022
    “…This project is about the study of evolutionary music, and focuses on the development of an algorithmic music composer using the Java programming language. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  7. 7
  8. 8
  9. 9
  10. 10

    A Toolkit for Simulation of Desktop Grid Environment by FOROUSHAN, PAYAM CHINI

    Published 2014
    “…In this type of environment it is nearly impossible to prove the effectiveness of a scheduling algorithm. Hence the main objective of this study is to develop a desktop grid simulator toolkit for measuring and modeling scheduler algorithm performance. …”
    Get full text
    Get full text
    Final Year Project
  11. 11

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…The objective of this study is to enhance the confidentiality and security of the image steganography application by combining cryptography algorithm. In this proposed model, the RSA algorithm is used to encrypt a secret message into an unreadable ciphertext before hiding it in the image. …”
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12

    A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment by Ruzita, Ahmad

    Published 2013
    “…This thesis describes original research in the field of software quality model by presenting a Feature Ranking Algorithm (FRA) for Pragmatic Quality Factor (PQF) model. …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14

    Network game (Literati) / Chung Mei Kuen by Chung, Mei Kuen

    Published 2003
    “…Therefore, efficient and robust servers that process separate client connections in separate threads are needed. Java applet is a well-known and widely used example of mobile code (a variation on the traditional client-server model). …”
    Get full text
    Get full text
    Thesis
  15. 15

    Modelling transmission dynamics of Covid-19 during pre-vaccination period in Malaysia: a GUI-based seird predictive model using Streamlit by Norsyahidah Zulkarnain, Muhammad Salihi Abdul Hadi, Nurul Farahain Mohammad, Shogar, Ibrahim

    Published 2024
    “…The mathematical model is solved using the Scipy odeint function, which uses the Livermore Solver for Ordinary Differential Equations with an Automatic method switching (LSODA) algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Modelling transmission dynamics of covid-19 during Pre-vaccination period in Malaysia: a predictive guiseird model using streamlit by Zulkarnain, Norsyahidah, Abdul Hadi, Muhammad Salihi, Mohammad, Nurul Farahain, Shogar, Ibrahim

    Published 2023
    “…The mathematical model is solved using Scipy odeint function, which uses Livermore Solver for Ordinary Differential Equations with an Automatic method switching (LSODA) algorithm. …”
    Get full text
    Get full text
    Proceeding Paper
  17. 17
  18. 18
  19. 19

    Simulation of COVID-19 outbreaks via graphical user interface (GUI) by Mohd Jamil, Norazaliza, Rosli, Norhayati, Muhammad, Noryanti

    Published 2021
    “…An improved SIRD model was solved via the 4th order Runge-Kutta (RK4) method and 14 unknown parameters were estimated by using Nelder- Mead algorithm and pattern-search technique. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Factor Strategy Model: Proofs of Prototype Concept for Software Quality Evaluation by Nathan, Darmawan, Ooi, Keng Boon, Chong, Alain Yee Loong, Tan, Boon In

    Published 2010
    “…Thus, by providing an algorithm analyzer to analyze the quality of design of the software product, developers or students can identify possible bad software design in their application.…”
    Get full text
    Get full text
    Article