Search Results - (( java application model algorithm ) OR ( parameter implementation level algorithm ))

Refine Results
  1. 1

    A Model for Evaluation of Cryptography Algorithm on UUM Portal by Norliana, Abdul Majid

    Published 2004
    “…Level one is the development of userID and password, level two involve the insertion of the testing parameter speed coding. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3
  4. 4
  5. 5

    Real-time algorithmic music composition application. by Yap, Alisa Yi Hui

    Published 2022
    “…This project is about the study of evolutionary music, and focuses on the development of an algorithmic music composer using the Java programming language. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  6. 6
  7. 7

    Dynamic traffic scheduling and resource reservation algorithms for output-buffered switches by Subramaniam, Shamala

    Published 2002
    “…Previously, this algorithm has been analysed for a unified resource reservation and scheduling algorithm while implementing a tail discarding strategy. …”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9

    ANALYSIS AND INTERPRETATION OF PRESSURE TRANSIENT TEST DATA BY RECENT ROBUST DECONVOLUTION METHODS by Mohd Mustafa, Muhammad Izzatullah

    Published 2013
    “…In this work, by using the recent robust deconvolution algorithm of Pimonov et al. and/or the ones implemented in Weatherford PanSystem Well Test Software, the effects of the algorithmic parameters (including error levels in pressure and rate data, and the curvature constraint value) as well as the initial pressure on the deconvolved responses are investigated. …”
    Get full text
    Get full text
    Final Year Project
  10. 10

    A Toolkit for Simulation of Desktop Grid Environment by FOROUSHAN, PAYAM CHINI

    Published 2014
    “…In this type of environment it is nearly impossible to prove the effectiveness of a scheduling algorithm. Hence the main objective of this study is to develop a desktop grid simulator toolkit for measuring and modeling scheduler algorithm performance. …”
    Get full text
    Get full text
    Final Year Project
  11. 11

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…The objective of this study is to enhance the confidentiality and security of the image steganography application by combining cryptography algorithm. In this proposed model, the RSA algorithm is used to encrypt a secret message into an unreadable ciphertext before hiding it in the image. …”
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12

    Implementation of High Speed Large Integer Multiplication Algorithm on Contemporary Architecture by Chang, Boon Chiao

    Published 2018
    “…We are able to eliminate the bottleneck, the CRT algorithm from our previous implementation by replacing it with another level of CTFNT and hence increased the multiplication operand size to 4096, 192K, 384K and 768K-bit.In our FPGA implementation, we focused on designing the processing unit ourselves that is capable of computing 3072-bit multiplication. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  13. 13

    Agents for Fuzzy Indices of Reliability Power System with Uncertainty Using Monte Carlo Algorithm by Shalash, Nadheer A., Abu Zaharin, Ahmad

    Published 2014
    “…The standard deviation of load level uncertainty in power system reliability assessment has a different value for each load level leading to complexity iterations required in the convergence of Monte Carlo algorithm. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14

    A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment by Ruzita, Ahmad

    Published 2013
    “…This thesis describes original research in the field of software quality model by presenting a Feature Ranking Algorithm (FRA) for Pragmatic Quality Factor (PQF) model. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16

    Adaptive differential evolution algorithm with fitness based selection of parameters and mutation strategies / Rawaa Dawoud Hassan Al-Dabbagh by Rawaa Dawoud Hassan, Al-Dabbagh

    Published 2015
    “…ARDE algorithm makes use of JADE strategy and the MDE_pBX parameters adaptive schemes as frameworks. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Network game (Literati) / Chung Mei Kuen by Chung, Mei Kuen

    Published 2003
    “…Therefore, efficient and robust servers that process separate client connections in separate threads are needed. Java applet is a well-known and widely used example of mobile code (a variation on the traditional client-server model). …”
    Get full text
    Get full text
    Thesis
  18. 18

    Implementation of generalized predictive control (GPC) for a real-time process control using labview by Mohd. Faudzi, Ahmad 'Athif

    Published 2006
    “…In this research, a predictive algorithm namely Generalized Predictive Control will be evaluated in real-time by applying LabVIEW software as tools for algorithm implementation. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Modified ant colony optimization algorithms for deterministic and stochastic inventory routing problems / Lily Wong by Lily , Wong

    Published 2018
    “…The computational results show that the algorithms which implement this new formulation are able to produce better solutions. …”
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    Identification of continuous-time model of hammerstein system using modified multi-verse optimizer by Most. Julakha, Jahan Jui

    Published 2021
    “…For the numerical identifications, three different levels of white noise variances were taken. The statistical analysis value (mean) was taken from the parameter deviation index to see how much our proposed algorithm has improved. …”
    Get full text
    Get full text
    Thesis