Search Results - (( java application a algorithm ) OR ( programming program window algorithm ))
Search alternatives:
- programming program »
- java application »
- window algorithm »
- application a »
- a algorithm »
-
1
Application-Programming Interface (API) for Song Recognition Systems
Published 2024“…In addition the implementation is done by algorithm using Java’s programming language, executed through an application developed in the Android operating system. …”
Article -
2
Face recognition and identification system (FaceRec) / Khew Jye Huei
Published 2004“…It describes the implementation and functions of a working system that performs the recognition and identification of human faces using the implement algorithms. …”
Get full text
Get full text
Thesis -
3
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis -
4
Overview of metaheuristic: classification of population and trajectory
Published 2010Subjects: “…Windows (Computer programs)…”
Get full text
Get full text
Monograph -
5
Formulating and solving stochastic truck and trailer routing problems using meta-heuristic algorithms / Seyedmehdi Mirmohammadsadeghi
Published 2015“…For solving TTRP, a variety of algorithms have been applied earlier but TTRPSD programming has not yet solved. …”
Get full text
Get full text
Get full text
Thesis -
6
Mathematical models and optimization algorithms for low-carbon Location-Inventory-Routing Problem with uncertainty
Published 2024“…The other two models are bi-objective mixed integer nonlinear programming models with soft time window constraints developed to minimize costs and maximize customer satisfaction under uncertain demand, which include stochastic and fuzzy demand, respectively. …”
Get full text
Get full text
Get full text
Thesis -
7
Agent-based extraction algorithm for computational problem solving
Published 2015“…Additionally, IPO_Agent not only produces the same PAC’s output results, but also generates module number and represents these results in another window. Finally,Algorithm_Agent employs the extracted information provided by IPO_Agent to produce the pseudo-code of the given problem and shows it in separate window. …”
Get full text
Get full text
Thesis -
8
Simulation and Visualization of TSP Using Ant Colony Optimization
Published 2023“…This model can be used to explain how to solve the traveling salesman problem by providing step-by-step instructions performed by users using ant colony optimization. With Windows as the operating system and the C# programming language in Visual Studio 2019, the program complies with the Extreme Programming (XP) software development method. …”
Get full text
Get full text
Get full text
Article -
9
Bi-objective mixed integer nonlinear programming model for low carbon location-inventory-routing problem with time windows and customer satisfaction
Published 2024“…This paper proposes a bi-objective mixed-integer nonlinear programming model with time window constraints that satisfies the normal distribution of stochastic customer demand. …”
Get full text
Get full text
Get full text
Article -
10
Encryption Technology on Windows Workstation
Published 2004“…This study is done because current encryption method in Windows environment is quite weak (e.g.: Windows password) and easily breakable using program like LC4(@stake LC4, about). …”
Get full text
Get full text
Final Year Project -
11
Ciphercrypt-an Encryption System / Nor Hidayah Ngah
Published 2004“…This system is implemented on a Windows platform with Visual Basic as a programming language and 3-DES as a main encryption algorithm. …”
Get full text
Get full text
Thesis -
12
-
13
Crop planning optimization on paddy fields under MADA using goal programming / Nur Izzah Naimi Mohd Radzi
Published 2021Get full text
Get full text
Student Project -
14
-
15
RSA Encryption & Decryption using JAVA
Published 2006“…The key is the trigger mechanism to the algorithm. Until the advent of the Internet, encryption was rarely used by the public, but was largely a military tool. …”
Get full text
Get full text
Final Year Project -
16
Web based applications for energy management system incorporated network reconfiguration using genetic algorithm / Wan Adnan Wan
Published 2006“…The development uses language Active Server Pages (ASP), HTML and C/C++. This program was tested on a Windows platform, which is a typical development environment for Web Based Applications for Energy Management System in UiTM. …”
Get full text
Get full text
Thesis -
17
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
18
Hardware Acceleration of Window Big-Digit (Wbd) Multiplication for Embedded Applications
Published 2015“…. ________________________________________________________________________________________________________________________ Window Big-Digit (wBD) is a recently proposed multiplication algorithm. …”
Get full text
Get full text
Thesis -
19
Optimized processing of satellite signal via evolutionary search algorithm
Published 2000“…This result implies that the size of the search window does not play an important role in determining the search efficiency. …”
Get full text
Get full text
Article -
20
