Search Results - (( java application system algorithm ) OR ( mode selection path algorithm ))

Refine Results
  1. 1

    Attack path selection optimization with adaptive genetic algorithms by Abd Rahman, A.S., Zakaria, M.N., Masrom, S.

    Published 2016
    “…Attack paths that satisfy certain optimization criteria are then selected and presented as possible components of the security solution. …”
    Get full text
    Get full text
    Article
  2. 2

    Attack path selection optimization with adaptive genetic algorithms by Abd Rahman, A.S., Zakaria, M.N., Masrom, S.

    Published 2016
    “…Attack paths that satisfy certain optimization criteria are then selected and presented as possible components of the security solution. …”
    Get full text
    Get full text
    Article
  3. 3
  4. 4
  5. 5
  6. 6

    A Mininet emulation study for SDN fat tree data center sleep mode routing algorithms by Fawzi S., Din N.M.

    Published 2025
    “…In this work meta heuristic algorithm is incorporated at the SDN central controller in a fat tree-based data centre for bandwidth usage monitoring, sleep decisions and path selection using Mininet emulation. …”
    Article
  7. 7

    A Novel Path Prediction Strategy for Tracking Intelligent Travelers by Motlagh, Omid Reza Esmaeili

    Published 2009
    “…The system is then used in path prediction mode for reconstructing the missing parts of the trajectory when actual positioning data is unavailable. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Real-time algorithmic music composition application. by Yap, Alisa Yi Hui

    Published 2022
    “…In addition, the system also utilises JavaFx and jFugue for its graphical user interface and music programming respectively. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  9. 9

    Route Optimization System by Zulkifli, Abdul Hayy

    Published 2005
    “…After much research into the many algorithms available, and considering some, including Genetic Algorithm (GA), the author selected Dijkstra's Algorithm (DA). …”
    Get full text
    Get full text
    Final Year Project
  10. 10
  11. 11
  12. 12
  13. 13

    Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework by Asaad Aref, Ibrahim

    Published 2004
    “…Java Media Framework library and the RTP protocol for audio transmission were used as development tools.The developed system designed in this thesis together with experimental results proved that the system could be implemented successfully. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Classification and quantification of palm oil adulteration via portable NIR spectroscopy by Basri, Katrul Nadia, Hussain, Mutia Nurulhusna, Bakar, Jamilah, Sharif, Zaiton, Abdul Khir, Mohd Fared, Zoolfakar, Ahmad Sabirin

    Published 2017
    “…MicroNIR was set up in two different scan modes to study the effect of path length to the performance of spectral measurement. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Classification and quantification of palm oil adulteration via portable NIR spectroscopy by Basri, Katrul Nadia, Hussain, Mutia Nurulhusna, Bakar, Jamilah, Sharif, Zaiton and, Zoolfakar, Ahmad Sabirin, Mohd Fared Abdul Khir

    Published 2024
    “…MicroNIR was set up in two different scan modes to study the effect of path length to the performance of spectral measurement. …”
    Article
  16. 16

    An Energy-Efficient Cross-Layer approach for cloud wireless green communications by Sadiq, Ali Safa, Almohammad, Turfah Zeyad, Rabiatul Adawiah, Muhamed Khadri, Ahmed, Abdulghani Ali, Lloret, Jaime

    Published 2017
    “…More precisely, network layer could utilize the MAC layer and physical layer information to establish an energy efficient route path to be used in forwarding data. The proposed EECL approach uses X-MAC protocol in support of duty cycle which introduces short preambles that switches to wake-up/sensing mode only for nodes belonging to routing path while the other nodes set to be in sleep mode. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18

    Network game (Literati) / Chung Mei Kuen by Chung, Mei Kuen

    Published 2003
    “…The possible applications of multimedia-networked system are endless, as the demand to support interactive communication among groups of users has increased significantly. …”
    Get full text
    Get full text
    Thesis
  19. 19

    SANAsms: Secure short messaging system for secure GSM mobile communication by Anuar, N.B., Azlan, I.M., Wahid, A.W.A., Zakaria, O.

    Published 2008
    “…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20

    Levy slime mould algorithm for solving numerical and engineering optimization problems by J. J., Jui, M. A., Ahmad, M. I. M., Rashid

    Published 2022
    “…The SMA is a newly developed metaheuristic algorithm that is inspired by the slime moulds natural oscillation mode. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item