Search Results - (( java application using algorithm ) OR ( basic complex ((data algorithm) OR (based algorithm)) ))
Search alternatives:
- java application »
- using algorithm »
- data algorithm »
- basic complex »
-
1
Application of genetic algorithm and JFugue in an evolutionary music generator
Published 2025“…This project explores the application of Genetic Algorithms (GA) with JFugue, which is a Java-based music programming library to develop an Evolutionary Music Generator. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
2
Real-time algorithmic music composition application.
Published 2022“…This project is about the study of evolutionary music, and focuses on the development of an algorithmic music composer using the Java programming language. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
3
Voting algorithms for large scale fault-tolerant systems
Published 2011“…By extracting various plots from different aspects, we demonstrated that, compared to the basic algorithm, our algorithm has higher reliability and availability as the quantity of the input data increases. …”
Get full text
Get full text
Thesis -
4
CHAOS BASED BLOCK ENCRYPTOR
Published 2008“…This project is basically a block encryption to protect block of data. …”
Get full text
Get full text
Final Year Project -
5
Recursive Subspace Identification Algorithm Using The Propagator Based Method
Published 2017“…However, because of the SVD computational complexity that involved in the algorithm, the classical SMI algorithms are not suitable for online application. …”
Get full text
Get full text
Get full text
Article -
6
An algorithm for the selection of planting lining technique towards optimizing land area: an algorithm for planting lining technique selection
Published 2012“…The algorithm is designed based on two basic works in which to calculate number of trees and divide an area into blocks. …”
Get full text
Get full text
Conference or Workshop Item -
7
A real-time vision-based touchless interaction of virtual heart using integration of motion gesture interaction methods
Published 2014“…Third, the range which is defined as left or right is used for gesture recognition. Lastly, the basic transformation such as rotation, translation and scale is executed if a data motion lies within the range. …”
Get full text
Get full text
Academic Exercise -
8
-
9
Dynamic Feedback Flow Control Algorithms for Unicast and Multicast Available Bit Rate Service in Asynchronous Transfer Mode Networks
Published 2000“…The rest may be implemented with additional complexity. Secondly, the research shifts to the problems of point-to-multipoint algorithms by introducing the basic concept of multicasting ABR servIce and reviewing a group of consolidation schemes, where the compromise between low consolidation nOlse and fast transient response is the main issue. …”
Get full text
Get full text
Thesis -
10
Agent-based extraction algorithm for computational problem solving
Published 2015“…Four agents have been proposed as an agent based model for CPS, which are User_Agent, PAC_Agent, IPO_Agent and Algorithm_Agent. …”
Get full text
Get full text
Thesis -
11
-
12
Development of automated neighborhood pattern sensitive faults syndrome generator for static random access memory
Published 2011“…This automated generator will facilitate NPSF analysis as manual fault analysis is no longer practical due to increasing memory size. The algorithms used in this generator are based on March algorithm. …”
Get full text
Get full text
Thesis -
13
Projected majorized-correlation technique for noise filtering and accuracy in orthogonal frequency division multiplexing
Published 2020“…Moreover, the accuracy of the proposed projected signal (py>) is proven when the sinusoidal signal shows right angle (θ=90°) and the area of recovered projected signal (py>) is reduced by around 46.2891% in cm2 comparing with random signal (y>) in TQM algorithm. In addition to that, by proposing the projected signal (py>) in PQMCC technique, complexity of TQM algorithm is reduced from second order of big notation O(Nc2) to first order O(Nc).In summary, the outcome of PQMCC technique based on noise attenuation, accuracy, and complexity reduction has achieved and proven in this thesis.…”
Get full text
Get full text
Thesis -
14
Development an accurate and stable range-free localization scheme for anisotropic wireless sensor networks
Published 2022“…Besides, the weighted coefficient and centroid algorithm is employed to reduce cumulative error by hop count and cut down computational complexity. …”
Get full text
Get full text
Thesis -
15
Automated bilateral negotiation with incomplete information in the e-marketplace.
Published 2011“…In one-side incomplete information problem, comparison between MGT algorithm and smart random trade-offs (SRT) algorithm indicates that MGT outperforms SRT. …”
Get full text
Get full text
Thesis -
16
Fuzzy parameterized complex multi-fuzzy soft expert set theory and its application in decision-making
Published 2019“…This FP - CMFSES model allows us to validate the information provided by an expert, at a given phase of time, using the properties of complex fuzzy sets. We then construct an algorithm based on this concept by converting it from the complex state to the real state. …”
Get full text
Get full text
Get full text
Article -
17
Penggunaan penggugusan subtraktif bagi menjana peraturan kabur
Published 2005“…By using the fuzzy clustering algorithm, membership function could be counted based on two possible clustering methods. …”
Get full text
Get full text
Article -
18
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
19
-
20
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph
