Search Results - (( java application design algorithm ) OR ( using rational methods algorithm ))
Search alternatives:
- application design »
- methods algorithm »
- java application »
- design algorithm »
- rational methods »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
2
Curve fitting by rational cubic Bézier with C1 and G1 continuity using metaheuristics methods
Published 2019Get full text
Get full text
Get full text
Conference or Workshop Item -
3
Data fitting by G1 rational cubic Be´zier curves using harmony search
Published 2015“…A metaheuristic algorithm, called Harmony Search (HS) is implemented for data fitting by rational cubic Be´ zier curves. …”
Get full text
Get full text
Article -
4
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
5
-
6
Data Fitting by G1 Rational Cubic Bézier Curves Using Harmony Search
Published 2015“…A metaheuristic algorithm, called Harmony Search (HS) is implemented for data fitting by rational cubic Bézier curves. …”
Get full text
Get full text
Get full text
Article -
7
Rational Bi-Quartic Spline with Six Parameters for Surface Interpolation with Application in Image Enlargement
Published 2020“…This rational bi-quartic spline has six free parameters that can be used to refine the final interpolating surface. …”
Get full text
Get full text
Article -
8
Representation Of Rational Bézier Quadratics Using Genetic Algorithm, Differential Evolution And Particle Swarm Optimization
Published 2013“…These techniques have been used to optimize control points and weights in the description of spline functions used. …”
Get full text
Get full text
Thesis -
9
-
10
-
11
Designing of skull defect implants using C1 rational cubic Bezier and offset curves
Published 2015“…In this study, data approximation by a rational cubic Bézier function uses HS to optimize position of middle points and value of the weights. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
12
Rational methods for solving first order ordinary differential equation
Published 2019“…In this study, two classes of rational methods of second to fourth order of accuracy are proposed. …”
Get full text
Get full text
Thesis -
13
-
14
Rational quadratic Bézier curve fitting by simulated annealing technique
Published 2013“…A metaheuristic algorithm, which is an approximation method called simulated annealing is implemented in order to have the best rational quadratic Bézier curve from a given data points. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
15
Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework
Published 2004“…Java Media Framework library and the RTP protocol for audio transmission were used as development tools.The developed system designed in this thesis together with experimental results proved that the system could be implemented successfully. …”
Get full text
Get full text
Thesis -
16
-
17
Design Of Robot Motion Planning Algorithm For Wall Following Robot
Published 2006Get full text
Get full text
Monograph -
18
-
19
Network game (Literati) / Chung Mei Kuen
Published 2003“…The main aspect of this thesis is to produce a networked gaming system, which process players. requested to play the game and enabling users to play the graphical game with people through the network. The algorithm design and implementation method must not only be workable, but also highly efficient in terms of execution speed and response time. …”
Get full text
Get full text
Thesis -
20
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…The application is designed to satisfy the user friendly interfaces and intent to be used by the end user without having the advanced knowledge in mobile security. …”
Get full text
Get full text
Conference or Workshop Item
