Search Results - (( java application use algorithm ) OR ( using function ((method algorithm) OR (_ algorithm)) ))
Search alternatives:
- java application »
- method algorithm »
- application use »
- using function »
- use algorithm »
-
1
Encrypted mobile messaging application using AES block cipher cryptography algorithm / Nur Rasyiqah Zulkifli
Published 2019“…The only way to read the messages is to know the method and the algorithm used in this project, which only the sender and the receiver will have the special key. …”
Get full text
Get full text
Student Project -
2
Real-time algorithmic music composition application.
Published 2022“…This project is about the study of evolutionary music, and focuses on the development of an algorithmic music composer using the Java programming language. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
3
A Toolkit for Simulation of Desktop Grid Environment
Published 2014“…The prototypes will be developed using JAVA language united with a MySQL database. …”
Get full text
Get full text
Final Year Project -
4
Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography
Published 2009“…The strength of the information hiding science is due to the non-existence of standard algorithms to be used in hiding secret messages. Also there is randomness in hiding methods such as combining several media (covers) with different methods to pass a secret message. …”
Get full text
Get full text
Get full text
Article -
5
Movie recommendation system / Najwa Syamimie Hasnu
Published 2020“…The algorithm chosen was implemented using Java Programming language and was tested using Root Means Square Error (RMSE) formula.…”
Get full text
Get full text
Thesis -
6
Songs Search Using Human Humming Voice
Published 2007“…Java programming language is used to build the system. The system has the functionality of humming voice recording and algorithms comparing both humming voice and song files in the system to fmd the right song. …”
Get full text
Get full text
Final Year Project -
7
Mitigation of shoulder-surfing attack on picture-based passwords using falsifying authentication methods / Por Lip Yee
Published 2012“…This research was undertaken to develop methods to mitigate shoulder-surfing attack. Two falsifying authentication methods using: (i) penup event and neighbouring connectivity manipulation; and (ii) partial password selection and metaheuristic randomisation algorithm methods, were proposed. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis -
8
Gravitational search – bat algorithm for solving single and bi-objective of non-linear functions
Published 2018“…The second technique is to solve bi-objective functions by using the BOBAT algorithm. The third technique is an integration of BOGSA with BOBAT to produce a BOGSBAT algorithm. …”
Get full text
Get full text
Thesis -
9
Network monopoly / Tan Kean Yeap
Published 2002“…The main aspect of this thesis is to produce a network monopoly system, which process multiple game sessions concurrently, enabling users to play the graphical game with people within the network. The algorithm design and implementation method mustnot only be workable, but also highly efficient in terms of execution speed and respond time. …”
Get full text
Get full text
Thesis -
10
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
Get full text
Get full text
Conference or Workshop Item -
11
Tacit knowledge for business intelligence framework using cognitive-based approach
Published 2022“…The framework was tested on 23 librarians from several university libraries in West Java and Yogyakarta, Indonesia. The algorithm starts with a content targeted interview to identify the list of problems faced by librarians. …”
Get full text
Get full text
Thesis -
12
An efficient method for determining all the extreme points of function with one variable
Published 2014“…The algorithm is the combination of the filled function's algorithm and Inner Iteration algorithm, called IRH's algorithm, in which Inner Iteration algorithm works at the domain which is usually ignored by filled function's algorithm.…”
Get full text
Thesis -
13
Evolution Performance of Symbolic Radial Basis Function Neural Network by Using Evolutionary Algorithms
Published 2023“…The SRBFNN’s objective function that corresponds to Satisfiability logic programming can be minimized by different algorithms, including Genetic Algorithm (GA), Evolution Strategy Algorithm (ES), Differential Evolution Algorithm (DE), and Evolutionary Programming Algorithm (EP). …”
Get full text
Get full text
Get full text
Article -
14
Smart student timetable planner
Published 2025“…The system is implemented using Node.js with Express for server-side development, HTML, CSS, and JavaScript for the frontend, and Socket.IO for real-time collaboration. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
15
Face recognition and identification system (FaceRec) / Khew Jye Huei
Published 2004“…It describes the implementation and functions of a working system that performs the recognition and identification of human faces using the implement algorithms. …”
Get full text
Get full text
Thesis -
16
Determining the preprocessing clustering algorithm in radial basis function neural network
Published 2008“…Three types of method used in this study to find the centres include random selections, K-means clustering algorithm and also K-median clustering algorithm. …”
Get full text
Get full text
Article -
17
Statistical data preprocessing methods in distance functions to enhance k-means clustering algorithm
Published 2018“…It shows that the IQR-HEOM method is more efficient to rectify the problem caused by using range in HEOM. …”
Get full text
Get full text
Get full text
Thesis -
18
Bees algorithm enhanced with Nelder and Mead method for numerical function optimisation
Published 2019“…The performance of the proposed algorithm was tested on a set of seventeen well-known benchmark functions. …”
Get full text
Get full text
Get full text
Get full text
Article -
19
Evolution Performance of Symbolic Radial Basis Function Neural Network by Using Evolutionary Algorithms
Published 2023“…The SRBFNN’s objective function that corresponds to Satisfiability logic programming can be minimized by different algorithms, including Genetic Algorithm (GA), Evolution Strategy Algorithm (ES), Differential Evolution Algorithm (DE), and Evolutionary Programming Algorithm (EP). …”
Get full text
Get full text
Get full text
Article -
20
Evolution Performance of Symbolic Radial Basis Function Neural Network by Using Evolutionary Algorithms
Published 2023“…The SRBFNN’s objective function that corresponds to Satisfiability logic programming can be minimized by different algorithms, including Genetic Algorithm (GA), Evolution Strategy Algorithm (ES), Differential Evolution Algorithm (DE), and Evolutionary Programming Algorithm (EP). …”
Get full text
Get full text
Get full text
Article
