Search Results - (( java application model algorithm ) OR ( using integration practice algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3
  4. 4

    Real-time algorithmic music composition application. by Yap, Alisa Yi Hui

    Published 2022
    “…This project is about the study of evolutionary music, and focuses on the development of an algorithmic music composer using the Java programming language. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  5. 5
  6. 6
  7. 7
  8. 8

    A Toolkit for Simulation of Desktop Grid Environment by FOROUSHAN, PAYAM CHINI

    Published 2014
    “…In this type of environment it is nearly impossible to prove the effectiveness of a scheduling algorithm. Hence the main objective of this study is to develop a desktop grid simulator toolkit for measuring and modeling scheduler algorithm performance. …”
    Get full text
    Get full text
    Final Year Project
  9. 9

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…The objective of this study is to enhance the confidentiality and security of the image steganography application by combining cryptography algorithm. In this proposed model, the RSA algorithm is used to encrypt a secret message into an unreadable ciphertext before hiding it in the image. …”
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment by Ruzita, Ahmad

    Published 2013
    “…This thesis describes original research in the field of software quality model by presenting a Feature Ranking Algorithm (FRA) for Pragmatic Quality Factor (PQF) model. …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12

    Network game (Literati) / Chung Mei Kuen by Chung, Mei Kuen

    Published 2003
    “…Therefore, efficient and robust servers that process separate client connections in separate threads are needed. Java applet is a well-known and widely used example of mobile code (a variation on the traditional client-server model). …”
    Get full text
    Get full text
    Thesis
  13. 13

    Integrated optimal control and parameter estimation algorithms for discrete-time nonlinear stochastic dynamical systems by Kek, Sie Long

    Published 2011
    “…In this way, the real solution is closely approximated. Through the practical examples, the applicability, efficiency and effectiveness of these integrated sub-algorithms have been demonstrated through solving several practical real world examples. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Reliability performance evaluation and integration of routing algorithm in shuffle exchange with minus one stage by Md Yunus, Nur Arzilawati

    Published 2012
    “…These six algorithms are integrated with four different types of SENs, and all the algorithms are analyze in this research. …”
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16
  17. 17

    Factor Strategy Model: Proofs of Prototype Concept for Software Quality Evaluation by Nathan, Darmawan, Ooi, Keng Boon, Chong, Alain Yee Loong, Tan, Boon In

    Published 2010
    “…Thus, by providing an algorithm analyzer to analyze the quality of design of the software product, developers or students can identify possible bad software design in their application.…”
    Get full text
    Get full text
    Article
  18. 18
  19. 19

    PID TUNING OF DC MOTOR USING SWARM ITELLIGENCE ALGORITHM by Hasdi Aimon, Arhimny

    Published 2012
    “…In order to evaluate the control performance, the three control parameters will be used to tune DC Motor simulated in MATLAB. PSO-PID Controller Graphical User Interface (GUI) has developed that integrates both C++ and MATLAB program for more practical use.…”
    Get full text
    Get full text
    Final Year Project
  20. 20

    CSC669 - Cryptographic Algorithms / College of Computing, Informatics and Media by UiTM, College of Computing, Informatics and Media

    Published 2021
    “…The subject delivery combines both theoretical and practical aspects of cryptography algorithms…”
    Get full text
    Get full text
    Get full text
    Teaching Resource