Search Results - (( java application system algorithm ) OR ( using computing force algorithm ))
Search alternatives:
- java application »
- system algorithm »
- using computing »
- computing force »
- force algorithm »
-
1
-
2
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
3
-
4
Real-time algorithmic music composition application.
Published 2022“…In addition, the system also utilises JavaFx and jFugue for its graphical user interface and music programming respectively. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
5
Route Optimization System
Published 2005“…After much research into the many algorithms available, and considering some, including Genetic Algorithm (GA), the author selected Dijkstra's Algorithm (DA). …”
Get full text
Get full text
Final Year Project -
6
Optimizing BOINC scheduling using genetic algorithm based on thermal profile
Published 2014“…Main function of BOINC is to use the idle time of computer to run some computation at background. …”
Get full text
Get full text
Conference or Workshop Item -
7
-
8
-
9
Optimization of blood vessel detection in retina images using multithreading and native code for portable devices
Published 2013Get full text
Get full text
Conference or Workshop Item -
10
-
11
Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework
Published 2004“…Java Media Framework library and the RTP protocol for audio transmission were used as development tools.The developed system designed in this thesis together with experimental results proved that the system could be implemented successfully. …”
Get full text
Get full text
Thesis -
12
-
13
Cryptanalysis in cryptographic algorithm design
Published 2006Get full text
Conference or Workshop Item -
14
Intelligent active force control of a robotic arm using genetic algorithm
Published 2002“…The results show that the GA used in the study being a stochastic and global optimizer successfully computes appropriate IN value to effect the control action. …”
Get full text
Get full text
Get full text
Article -
15
Virtual force field algorithm for a behaviour-based autonomous robot in unknown environments
Published 2011“…The present paper describes a real-time motion-planning approach which lies in the integration of three techniques: fuzzy logic (FL), virtual force field (VFF), and boundary following (BF). The FL algorithm is used for velocity control based on sonar readings. …”
Get full text
Get full text
Get full text
Article -
16
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
17
A real-time algorithm of optical tactile sensor for surface characterization / Nurul Fathiah Mohamed Rosli
Published 2016“…The overall image analysis technique involves the following algorithms: image acquisition (capturing of images), processing (thresholding, noise filtering and boundary detection) and recognition (force measurement). …”
Get full text
Get full text
Thesis -
18
Network game (Literati) / Chung Mei Kuen
Published 2003“…The possible applications of multimedia-networked system are endless, as the demand to support interactive communication among groups of users has increased significantly. …”
Get full text
Get full text
Thesis -
19
HAPTIC VISUALIZATION USING VISUAL TEXTURE INFORMATION
Published 2011Get full text
Get full text
Thesis -
20
Optimal loading analysis with penalty factors for generators using brute force method
Published 2022“…This paper reports the optimal loading analysis method using the Brute Force method with and without considering the penalty factor of power line loss. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item
