Search Results - (( java application interface algorithm ) OR ( based point method algorithm ))

Refine Results
  1. 1

    Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption by Yeo Zi Zian

    Published 2022
    “…The selected lightweight geo-encryption algorithm will be implemented in the proposed system, vi which develops by using Java language. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  2. 2

    Real-time algorithmic music composition application. by Yap, Alisa Yi Hui

    Published 2022
    “…In addition, the system also utilises JavaFx and jFugue for its graphical user interface and music programming respectively. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  3. 3

    Application-Programming Interface (API) for Song Recognition Systems by Murtadha Arif Sahbudin, Chakib Chaouch, Salvatore Serrano

    Published 2024
    “…In addition the implementation is done by algorithm using Java’s programming language, executed through an application developed in the Android operating system. …”
    Article
  4. 4

    Visdom: Smart guide robot for visually impaired people by Lee, Zhen Ting

    Published 2025
    “…The system architecture integrates ROS 2 on a Raspberry Pi, with TCP/IP connectivity enabling remote operation. An Android mobile application, developed using Java and the java.net.Socket library, provides an intuitive and accessible user interface for seamless interaction with the robot. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  5. 5
  6. 6

    Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework by Asaad Aref, Ibrahim

    Published 2004
    “…A design proposal was outlined to provide an adaptive client/server approach to stream audio contents using Real-Time Transport Protocol (RTP) involving architecture based on the Java Media Framework (JMF) Application Programmable Interfaces (API).RTP protocol is the Internet-standard protocol for the transport of real-time data, including audio and video and can be implemented by using Java Media Framework (JMF). …”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    Implementation of (AES) Advanced Encryption Standard algorithm in communication application by Moh, Heng Huong

    Published 2014
    “…The concept of ABS algorithm was firstly studied, including the definition, historical background, and a brief comparison was made between the ABS algorithm with other types of algorithm. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  9. 9

    Dual search maximum power point algorithm based on mathematical analysis under partially-shaded conditions by Hajighorbani, Shahrooz

    Published 2016
    “…Moreover, it is very important that the algorithms should be general and not so complicated which could be implemented for all systems.Therefore, this research presents design and development of a novel method, which is called dual search maximum power point (DSMPP) algorithm, for tracking the GMPP under PSCs. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Cluster Analysis of Data Points using Partitioning and Probabilistic Model-based Algorithms by Raheem, Ajiboye Adeleke, Hauwau, Isah-Kebbe, O., Oladele Tinuke

    Published 2014
    “…This study explores the performance accuracies of partitioning-based algorithms and probabilistic model-based algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    SANAsms: Secure short messaging system for secure GSM mobile communication by Anuar, N.B., Azlan, I.M., Wahid, A.W.A., Zakaria, O.

    Published 2008
    “…The application is designed to satisfy the user friendly interfaces and intent to be used by the end user without having the advanced knowledge in mobile security. …”
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12
  13. 13

    Evaluating the effectiveness of integrated benders decomposition algorithm and epsilon constraint method for multi-objective facility location problem under demand uncertainty by Rahimi, Iman, Tang, Sai Hong, Ahmadi, Abdollah, Ahmad, Siti Azfanizam, Lee, Lai Soon, Sharaf, Adel M.

    Published 2017
    “…One of the most challenging issues in multi-objective problems is finding Pareto optimal points. This paper describes an algorithm based on Benders Decomposition Algorithm (BDA) which tries to find Pareto solutions. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Binary search algorithm-based maximum power point tracking for photovoltaic system under partial shaded conditions by Hamdan, Daniyal, Meng, Chung Tiong, Mohd Herwan, Sulaiman

    Published 2018
    “…The BSA-based algorithm, together with well-established PSO and another commonly used hill climbing method, perturb and observe (P&O) were developed and simulated in MATLAB Simulink. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15
  16. 16

    Fuzzy logic-based hill climbing technique for photovoltaic maximum power point tracking converter by Taghvaee, Mohammad Hossein

    Published 2013
    “…This proposed MPPT algorithm is named as fuzzy logic based hill climbing.The proposed MPPT was implemented by fuzzifying the rules of hill climbing search method to reduce its drawbacks, and with this technique, not only the real maximum power point can be readily tracked, but also fast dynamic response and small steady state error can be achieved. …”
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18

    Improving performance of automated coronary arterial tree center-line extraction, stent localization and tracking by Boroujeni, Farsad Zamani

    Published 2012
    “…The solution consists of an algorithm for automatic collection of candidate seed points using efficient grid line searching mechanism and a validation method which uses local geometric and intensity based features as effective validation rules to discriminate between the actual seed point and false alarms. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Multi-base number representation in application to scalar multiplication and pairing computation by Mohammed Ismail, Abdelwahed

    Published 2011
    “…The multi-bases number representation is also applied to construct another new elliptic curve joint-scalar multiplication algorithm, called the joint-multi base algorithm. …”
    Get full text
    Get full text
    Thesis
  20. 20