Search Results - (( evolution implementation learning algorithm ) OR ( java applications based algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    Machine learning and deep learning approaches for cybersecurity: a review by Halbouni, Asmaa Hani, Gunawan, Teddy Surya, Habaebi, Mohamed Hadi, Halbouni, Murad, Kartiwi, Mira, Ahmad, Robiah

    Published 2022
    “…It discusses recent machine learning and deep learning work with various network implementations, applications, algorithms, learning approaches, and datasets to develop an operational intrusion detection system.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  3. 3
  4. 4

    Application of genetic algorithm and JFugue in an evolutionary music generator by Tang, Jia Rou

    Published 2025
    “…This project explores the application of Genetic Algorithms (GA) with JFugue, which is a Java-based music programming library to develop an Evolutionary Music Generator. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  5. 5
  6. 6
  7. 7

    Real-Time Video Processing Using Native Programming on Android Platform by Saipullah, Khairul Muzzammil

    Published 2012
    “…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    Q-learning based vertical handover decision algorithm in LTE-A two-tier macrocell-femtocell systems / Ammar Bathich by Bathich, Ammar

    Published 2019
    “…The main objective of this work is to propose and implement an efficient handover decision procedure based on users’ profiles using Q-learning technique in a LTE-A macrocell-femtocell networks. …”
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10

    Real-time algorithmic music composition application. by Yap, Alisa Yi Hui

    Published 2022
    “…This project is about the study of evolutionary music, and focuses on the development of an algorithmic music composer using the Java programming language. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  11. 11
  12. 12

    Artificial fish swarm optimization for multilayer network learning in classification problems by Hasan, Shafaatunnur, Tan, Swee Quo, Shamsuddin, Siti Mariyam

    Published 2012
    “…Nature-Inspired Computing (NIC) has always been a promising tool to enhance neural network learning. Artificial Fish Swarm Algorithm (AFSA) as one of the NIC methods is widely used for optimizing the global searching of ANN.In this study, we applied the AFSA method to improve the Multilayer Perceptron (MLP) learning for promising accuracy in various classification problems.The parameters of AFSA: AFSA prey, AFSA swarm and AFSA follow are implemented on the MLP network for improving the accuracy of various classification datasets from UCI machine learning. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Artificial Fish Swarm Optmization for Multilayernetwork Learning in Classification Problems by Hasan, Shafaatunnur, Tan, Swee Quo, Shamsuddin, Siti Mariyam, Sallehuddin, Roselina

    Published 2012
    “…The parameters of AFSA: AFSA prey, AFSA swarm and AFSA follow are implemented on the MLP network for improving the accuracy of various classification datasets from UCI machine learning. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework by Asaad Aref, Ibrahim

    Published 2004
    “…A design proposal was outlined to provide an adaptive client/server approach to stream audio contents using Real-Time Transport Protocol (RTP) involving architecture based on the Java Media Framework (JMF) Application Programmable Interfaces (API).RTP protocol is the Internet-standard protocol for the transport of real-time data, including audio and video and can be implemented by using Java Media Framework (JMF). …”
    Get full text
    Get full text
    Thesis
  15. 15

    Feature selection optimization using hybrid relief-f with self-adaptive differential evolution by Zainudin, Muhammad Noorazlan Shah, Sulaiman, Md. Nasir, Mustapha, Norwati, Perumal, Thinagaran, Ahmad Nazri, Azree Shahrel, Mohamed, Raihani, Abd Manaf, Syaifulnizam

    Published 2017
    “…Hence, feature selection is embedded to select the most meaningful features based on their rank. Differential evolution (DE) is one of the evolutionary algorithms that are widely used in various classification domains. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    A Toolkit for Simulation of Desktop Grid Environment by FOROUSHAN, PAYAM CHINI

    Published 2014
    “…The selected methodology for the application development is based on prototyping methodology. …”
    Get full text
    Get full text
    Final Year Project
  17. 17
  18. 18

    Genetic ensemble biased ARTMAP method of ECG-Based emotion classification by Loo, C.K., Liew, W.S., Sayeed, M.S.

    Published 2012
    “…Individual emotional states are highly variable and are subject to evolution from personal experiences. For this reason, the above system is designed to be able to perform learning and classification in real-time to account for inter-individual and intra-individual emotional drift over time. …”
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19
  20. 20

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item