Search Results - (( java application interface algorithm ) OR ( user evaluation force algorithm ))

Refine Results
  1. 1

    Real-time algorithmic music composition application. by Yap, Alisa Yi Hui

    Published 2022
    “…In addition, the system also utilises JavaFx and jFugue for its graphical user interface and music programming respectively. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  2. 2

    Application-Programming Interface (API) for Song Recognition Systems by Murtadha Arif Sahbudin, Chakib Chaouch, Salvatore Serrano

    Published 2024
    “…In addition the implementation is done by algorithm using Java’s programming language, executed through an application developed in the Android operating system. …”
    Article
  3. 3

    A new algorithm on Graphical User Authentication (GUA) based on multi-line grids by Lashkari, Arash Habibi, Gani, Abdullah, Sabet, Leila Ghasemi, Farmand, Samaneh

    Published 2010
    “…Finally, a comparison of the newly proposed algorithm and previous algorithms will be evaluated in a table.…”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Visdom: Smart guide robot for visually impaired people by Lee, Zhen Ting

    Published 2025
    “…The system architecture integrates ROS 2 on a Raspberry Pi, with TCP/IP connectivity enabling remote operation. An Android mobile application, developed using Java and the java.net.Socket library, provides an intuitive and accessible user interface for seamless interaction with the robot. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  5. 5

    Visdom: Smart guide robot for visually impaired people by Lee, Zhen Ting

    Published 2025
    “…The system architecture integrates ROS 2 on a Raspberry Pi, with TCP/IP connectivity enabling remote operation. An Android mobile application, developed using Java and the java.net.Socket library, provides an intuitive and accessible user interface for seamless interaction with the robot. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  6. 6
  7. 7

    Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework by Asaad Aref, Ibrahim

    Published 2004
    “…A design proposal was outlined to provide an adaptive client/server approach to stream audio contents using Real-Time Transport Protocol (RTP) involving architecture based on the Java Media Framework (JMF) Application Programmable Interfaces (API).RTP protocol is the Internet-standard protocol for the transport of real-time data, including audio and video and can be implemented by using Java Media Framework (JMF). …”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9

    Implementation of (AES) Advanced Encryption Standard algorithm in communication application by Moh, Heng Huong

    Published 2014
    “…The concept of ABS algorithm was firstly studied, including the definition, historical background, and a brief comparison was made between the ABS algorithm with other types of algorithm. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  10. 10

    Backhaul load and performance optimality of partial joint processing schemes in LTE-A networks by Kousha, Mohammad

    Published 2014
    “…All these achieved because the proposed algorithm targets those users located at the cluster borders who more likely cause rank deficiency. …”
    Get full text
    Get full text
    Thesis
  11. 11

    SANAsms: Secure short messaging system for secure GSM mobile communication by Anuar, N.B., Azlan, I.M., Wahid, A.W.A., Zakaria, O.

    Published 2008
    “…The application is designed to satisfy the user friendly interfaces and intent to be used by the end user without having the advanced knowledge in mobile security. …”
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12
  13. 13

    Automated negative lightning return strokes characterization using brute-force search algorithm by Abdul Haris, Faranadia, Ab. Kadir, Mohd Zainal Abidin, Sudin, Sukhairi, Jasni, Jasronita, Johari, Dalina, Zaini, Nur Hazirah

    Published 2022
    “…Hence, this study proposed the development of an automated negative lightning return strokes characterization using a brute-force search algorithm. A total of 170 lightning electric field waveforms were characterized automatically using the proposed algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Automated negative lightning return strokes characterization using brute-force search algorithm by Abdul Haris, Faranadia, Ab. Kadir, Mohd Zainal Abidin, Sudin, Sukhairi, Jasni, Jasronita, Johari, Dalina, Zaini, Nur Hazirah

    Published 2022
    “…Hence, this study proposed the development of an automated negative lightning return strokes characterization using a brute-force search algorithm. A total of 170 lightning electric field waveforms were characterized automatically using the proposed algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15
  16. 16

    Securing graphical user password using multi-grid technique from shoulder surfing attack / Leila Ghasemi Sabet by Sabet, Leila Ghasemi

    Published 2010
    “…For security in graphical password, there are some attacks such as shoulder surfing, and brute force. Shoulder surfing is one of the major attacks; it means this project must cover the shoulder surfing attacks for making the algorithms more secure. …”
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18

    Multi-user beamforming, fairness and device-to-device channel state information sharing in downlink non-orthogonal multiple access systems by Abdulhussein, Mohanad Mohammed

    Published 2021
    “…To this end, a fair user clustering algorithm with two stages is proposed, wherein the strong and weak users are selected in the first and second stages, respectively. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Improved criteria determination of an automated negative lightning return strokes characterisation using Brute-Force search algorithm by Abdul Haris, Faranadia

    Published 2021
    “…Accordingly, the proposed Brute-Force search algorithm characterised the negative lightning return strokes parameters based on the seven parameters. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Real time self-calibration algorithm of pressure sensor for robotic hand glove system by Almassri, Ahmed M. M.

    Published 2019
    “…This provides a useful methodology for the user to evaluate the performance of any measurement system in a real-time environment.…”
    Get full text
    Get full text
    Thesis