Search Results - (( java application during algorithm ) OR ( program implementation window algorithm ))

Refine Results
  1. 1

    Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system by Beg, Abul Hashem

    Published 2011
    “…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Encryption Technology on Windows Workstation by Amdan, Zulkhaimi

    Published 2004
    “…This study is done because current encryption method in Windows environment is quite weak (e.g.: Windows password) and easily breakable using program like LC4(@stake LC4, about). …”
    Get full text
    Get full text
    Final Year Project
  3. 3

    Ciphercrypt-an Encryption System / Nor Hidayah Ngah by Nor Hidayah, Ngah

    Published 2004
    “…This system is implemented on a Windows platform with Visual Basic as a programming language and 3-DES as a main encryption algorithm. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Hardware Acceleration of Window Big-Digit (Wbd) Multiplication for Embedded Applications by Lim, Ee Wah

    Published 2015
    “…This shows that wBD algorithm can be optimally implemented in hardware and demonstrates excellent speed gain over pure software implementation. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Application-Programming Interface (API) for Song Recognition Systems by Murtadha Arif Sahbudin, Chakib Chaouch, Salvatore Serrano

    Published 2024
    “…An approach capable of recognizing an audio piece of music with an accuracy equal to 90% was further tested based on this result. In addition the implementation is done by algorithm using Java’s programming language, executed through an application developed in the Android operating system. …”
    Article
  6. 6

    Face recognition and identification system (FaceRec) / Khew Jye Huei by Khew , Jye Huei

    Published 2004
    “…It describes the implementation and functions of a working system that performs the recognition and identification of human faces using the implement algorithms. …”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    Development of an education simulator for particle swarm optimization in solving economic dispatch problems: article / Mohd Hafiz Mat Hussain by Mat Hussain, Mohd Hafiz

    Published 2009
    “…The Graphical User Interface (GUI) program design and PSO algorithm used in this study was implemented by using MATLAB 7.6.0 (R2008a)…”
    Get full text
    Get full text
    Article
  9. 9

    Development of an education simulator for particle swarm optimization in solving economic dispatch problems / Mohd Hafiz Mat Hussain by Mat Hussain, Mohd Hafiz

    Published 2009
    “…The Graphical User Interface (GUI) program design and PSO algorithm used in this study was implemented by using MATLAB 7.6.0 (R2008a).…”
    Get full text
    Get full text
    Thesis
  10. 10

    SUDOKU HELPER by Abdul Razak, Muhammad Asyraf

    Published 2015
    “…In this paper research, author presents an algorithm to provide a tutorial for any Sudoku player who got stuck during the solving process. …”
    Get full text
    Get full text
    Final Year Project
  11. 11

    The design and implementation of a two and three-dimensional triangular irregular network based GIS by Abdul Rahman, Alias

    Published 2000
    “…To facilitate the output of the developed methods and algorithms, software called TinSoft, which is a Windows-based Multiple Document Interface software was developed in this research.…”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    Development of a Production Planning and Control Software in Total Productivity Maintenance Environment by Lee, Pang Seng

    Published 2004
    “…This program has been created in Window format and encoded using Microsoft Visual Basic 6.0. …”
    Get full text
    Get full text
    Thesis
  13. 13

    FPGA Implementation of Emergency Door Car Entry System by Zaini Sulaiman

    Published 2008
    “…Emergency door car entry system can be implemented using Field Programmable Gate Array (FPGA) board. …”
    Get full text
    Learning Object
  14. 14

    The discovery of Top-K DNA frequent patterns with approximate method / Nittaya Kerdprasop and Kittisak Kerdprasop by Kerdprasop, Nittaya, Kerdprasop, Kittisak

    Published 2014
    “…These representatives are subsequently used in the main process of frequent pattern mining. Our designed algorithm had been implemented with the Erlang language, which is the functional programming paradigm with inherent support for pattern matching. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Talkout : Protecting mental health application with a lightweight message encryption by Gavin Teo Juen

    Published 2022
    “…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  16. 16

    Development of oil palm fresh fruit bunch maturity assessment software for personal digital assistant by Kavandi, Nader

    Published 2011
    “…The software allows the user to take a picture from the FFBs using the built-in camera of the PDA and analyze it inside the PDA using a wisely implemented Hue based image processing algorithm. User can review the results on the screen, Geotag it with the current location data received through the built-in GPS receiver of the PDA, and lastly save them in a database for further analysis or future referencing. …”
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18
  19. 19

    A malware analysis and detection system for mobile devices / Ali Feizollah by Ali, Feizollah

    Published 2017
    “…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications by Hydara, Isatou

    Published 2015
    “…This research work was limited to Java based web applications. In future research, the method can be extended to include other programming languages as well as other similar web application security vulnerabilities.…”
    Get full text
    Get full text
    Thesis