Search Results - (( java application _ algorithm ) OR ( based operations method algorithm ))

Refine Results
  1. 1

    Application of genetic algorithm and JFugue in an evolutionary music generator by Tang, Jia Rou

    Published 2025
    “…This project explores the application of Genetic Algorithms (GA) with JFugue, which is a Java-based music programming library to develop an Evolutionary Music Generator. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  2. 2

    An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe by Yakub Kayode, Saheed, Kazeem Alagbe, Gbolagade

    Published 2017
    “…We use a parallel technique that divides RSA power process into seperate threads and employs the use of Chinese Remainder Theorem (CRT) to decrease the time required for both encryption and decryption operation. Java programming language is used to implement the algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Application-Programming Interface (API) for Song Recognition Systems by Murtadha Arif Sahbudin, Chakib Chaouch, Salvatore Serrano

    Published 2024
    “…An approach capable of recognizing an audio piece of music with an accuracy equal to 90% was further tested based on this result. In addition the implementation is done by algorithm using Java’s programming language, executed through an application developed in the Android operating system. …”
    Article
  4. 4

    Development of least square adjustment application for traversing / Harith Fadhillah Soeb by Soeb, Harith Fadhillah

    Published 2019
    “…However, the least square method is a better method than Bowditch method. Meanwhile, there is an adjustment application that uses least square method with different observation equation and using angle based method. …”
    Get full text
    Get full text
    Thesis
  5. 5

    A malware analysis and detection system for mobile devices / Ali Feizollah by Ali, Feizollah

    Published 2017
    “…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption by Yeo Zi Zian

    Published 2022
    “…The project's expected outcome is a GPS-Based Physical Identity and Access Management System with the selected lightweight geo-encryption algorithm that can be used to support the control access and management operations of UMS security division.…”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  7. 7

    Design & Development of a Robotic System Using LEGO Mindstorm by Abd Manap, Nurulfajar, Md Salim, Sani Irwan, Haron, Nor Zaidi

    Published 2006
    “…This research presents a design and development of robotic system based on LEGO Mindstorm kit. The system is capable in operating an off-line programming method, starting from its programming sequences until robotic implementation of the program. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    Design and development of an intuitive desktop application for rapid SARS-CoV-2 diagnosis using electrochemical potentiostat by Assaig, Faisal Ahmed, Gunawan, Teddy Surya, Nordin, Anis Nurashikin, Ab Rahim, Rosminazuin, Mohd Zain, Zainiharyati

    Published 2023
    “…Our primary focus revolved around creating a user-friendly desktop application, seamlessly integrating an algorithm that automates result generation for operators. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  9. 9

    Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system by Beg, Abul Hashem

    Published 2011
    “…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
    Get full text
    Get full text
    Thesis
  10. 10

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
    Get full text
    Get full text
    Final Year Project
  11. 11
  12. 12
  13. 13
  14. 14
  15. 15

    Clustering ensemble learning method based on incremental genetic algorithms by Ghaemi, Reza

    Published 2012
    “…In the first and second phases, a threshold fuzzy c-means clustering algorithm as a clusterer and a pattern ensemble learning method based on the incremental genetic-based algorithms are proposed respectively. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Effect of negative campaign strategy of election algorithm in solving optimization problem by Hamza Abubakar, Saratha Sathasivam, Shehab Abdulhabib Alzaeemi

    Published 2020
    “…Election algorithm (EA) is an optimization technique based on minimization and coalition operations to solve competition among neurons. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Solving economic load dispatch problem using genetic algorithm method / Norliza Kamarulzaman by Kamarulzaman, Norliza

    Published 2009
    “…In this study, Genetic Algorithm method is used to overcome this problem. …”
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19

    Optimization of energy management and conversion in the water systems based on evolutionary algorithms by Karami, Hojat, Ehteram, Mohammad, Mousavi, Sayed-Farhad, Farzin, Saeed, Kisi, Ozgur, El-Shafie, Ahmed

    Published 2019
    “…In this article, an application of weed optimization algorithm (WOA) for reservoir operation was proposed. …”
    Get full text
    Get full text
    Article
  20. 20

    Enhancement of {0, 1, 3}-NAF Recoding Algorithm using Block Method Technique for Elliptic Curve Cryptosystem by Bafandehkar, Mohsen

    Published 2015
    “…The objective of this research is to introduce an efficient implementation of {0,1, 3}-NAF scalar recoding algorithm by implementing block method. With block method application on the based algorithm, a complex look up table is undesired. …”
    Get full text
    Get full text
    Thesis