Search Results - (( java application system algorithm ) OR ( programming problem window algorithm ))

Refine Results
  1. 1

    Face recognition and identification system (FaceRec) / Khew Jye Huei by Khew , Jye Huei

    Published 2004
    “…Besides that, the system will build in Windows 2000 Professional Operating System. …”
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3
  4. 4
  5. 5

    Mathematical models and optimization algorithms for low-carbon Location-Inventory-Routing Problem with uncertainty by Liu, Lihua

    Published 2024
    “…The other two models are bi-objective mixed integer nonlinear programming models with soft time window constraints developed to minimize costs and maximize customer satisfaction under uncertain demand, which include stochastic and fuzzy demand, respectively. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Agent-based extraction algorithm for computational problem solving by Rajabi, Maryam

    Published 2015
    “…Modeling Computational Problem Solving (CPS) is the main issue in teaching programming where the given text is needed to be transformed into a model then later into a programming language. …”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8
  9. 9

    Simulation and Visualization of TSP Using Ant Colony Optimization by Tri Basuki, Kurniawan, Misinem, ., Astried, ., Joan Angelina, Widians

    Published 2023
    “…The Travelling Salesman Problem (TSP) is a well-known algorithmic problem its main objective is optimization. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10
  11. 11

    Real-time algorithmic music composition application. by Yap, Alisa Yi Hui

    Published 2022
    “…In addition, the system also utilises JavaFx and jFugue for its graphical user interface and music programming respectively. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  12. 12

    Route Optimization System by Zulkifli, Abdul Hayy

    Published 2005
    “…After much research into the many algorithms available, and considering some, including Genetic Algorithm (GA), the author selected Dijkstra's Algorithm (DA). …”
    Get full text
    Get full text
    Final Year Project
  13. 13
  14. 14
  15. 15
  16. 16

    Vehicle routing problem: models and solutions by Liong, Choong Yeun, Wan Rosmanira Ismail, Khairuddin Omar, Mourad Zirour

    Published 2008
    “…The VRP is divided into many types. The important problems are VRP with Time Windows, VRP with Pick-Up and Delivery and Capacitated VRP. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework by Asaad Aref, Ibrahim

    Published 2004
    “…Java Media Framework library and the RTP protocol for audio transmission were used as development tools.The developed system designed in this thesis together with experimental results proved that the system could be implemented successfully. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Development of an education simulator for particle swarm optimization in solving economic dispatch problems: article / Mohd Hafiz Mat Hussain by Mat Hussain, Mohd Hafiz

    Published 2009
    “…The Graphical User Interface (GUI) program design and PSO algorithm used in this study was implemented by using MATLAB 7.6.0 (R2008a)…”
    Get full text
    Get full text
    Article
  19. 19

    Development of an education simulator for particle swarm optimization in solving economic dispatch problems / Mohd Hafiz Mat Hussain by Mat Hussain, Mohd Hafiz

    Published 2009
    “…The Graphical User Interface (GUI) program design and PSO algorithm used in this study was implemented by using MATLAB 7.6.0 (R2008a).…”
    Get full text
    Get full text
    Thesis
  20. 20

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item