Search Results - (( java application using algorithm ) OR ( basic complex ((data algorithm) OR (based algorithm)) ))

Refine Results
  1. 1

    Application of genetic algorithm and JFugue in an evolutionary music generator by Tang, Jia Rou

    Published 2025
    “…This project explores the application of Genetic Algorithms (GA) with JFugue, which is a Java-based music programming library to develop an Evolutionary Music Generator. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  2. 2

    Real-time algorithmic music composition application. by Yap, Alisa Yi Hui

    Published 2022
    “…This project is about the study of evolutionary music, and focuses on the development of an algorithmic music composer using the Java programming language. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  3. 3

    Voting algorithms for large scale fault-tolerant systems by Karimi, Abbas

    Published 2011
    “…By extracting various plots from different aspects, we demonstrated that, compared to the basic algorithm, our algorithm has higher reliability and availability as the quantity of the input data increases. …”
    Get full text
    Get full text
    Thesis
  4. 4

    CHAOS BASED BLOCK ENCRYPTOR by SARIN, FARHANA

    Published 2008
    “…This project is basically a block encryption to protect block of data. …”
    Get full text
    Get full text
    Final Year Project
  5. 5

    Recursive Subspace Identification Algorithm Using The Propagator Based Method by Jamaludin, Irma Wani, Abdul Wahab, Norhaliza

    Published 2017
    “…However, because of the SVD computational complexity that involved in the algorithm, the classical SMI algorithms are not suitable for online application. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    An algorithm for the selection of planting lining technique towards optimizing land area: an algorithm for planting lining technique selection by Md Badarudin, Ismadi, Md Sultan, Abu Bakar, Sulaiman, Md. Nasir, Mamat, Ali, Tengku Muda Mohamed, Mahmud

    Published 2012
    “…The algorithm is designed based on two basic works in which to calculate number of trees and divide an area into blocks. …”
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    A real-time vision-based touchless interaction of virtual heart using integration of motion gesture interaction methods by Ng, Ing Kye

    Published 2014
    “…Third, the range which is defined as left or right is used for gesture recognition. Lastly, the basic transformation such as rotation, translation and scale is executed if a data motion lies within the range. …”
    Get full text
    Get full text
    Academic Exercise
  8. 8
  9. 9

    Dynamic Feedback Flow Control Algorithms for Unicast and Multicast Available Bit Rate Service in Asynchronous Transfer Mode Networks by Abdelrahman, Ali Mohamed

    Published 2000
    “…The rest may be implemented with additional complexity. Secondly, the research shifts to the problems of point-to-multipoint algorithms by introducing the basic concept of multicasting ABR servIce and reviewing a group of consolidation schemes, where the compromise between low consolidation nOlse and fast transient response is the main issue. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Agent-based extraction algorithm for computational problem solving by Rajabi, Maryam

    Published 2015
    “…Four agents have been proposed as an agent based model for CPS, which are User_Agent, PAC_Agent, IPO_Agent and Algorithm_Agent. …”
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12

    Development of automated neighborhood pattern sensitive faults syndrome generator for static random access memory by Rusli, Julie Roslita

    Published 2011
    “…This automated generator will facilitate NPSF analysis as manual fault analysis is no longer practical due to increasing memory size. The algorithms used in this generator are based on March algorithm. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Projected majorized-correlation technique for noise filtering and accuracy in orthogonal frequency division multiplexing by Alsaadi, Alaa Abdullah Mohammed

    Published 2020
    “…Moreover, the accuracy of the proposed projected signal (py>) is proven when the sinusoidal signal shows right angle (θ=90°) and the area of recovered projected signal (py>) is reduced by around 46.2891% in cm2 comparing with random signal (y>) in TQM algorithm. In addition to that, by proposing the projected signal (py>) in PQMCC technique, complexity of TQM algorithm is reduced from second order of big notation O(Nc2) to first order O(Nc).In summary, the outcome of PQMCC technique based on noise attenuation, accuracy, and complexity reduction has achieved and proven in this thesis.…”
    Get full text
    Get full text
    Thesis
  14. 14

    Development an accurate and stable range-free localization scheme for anisotropic wireless sensor networks by Han, Fengrong

    Published 2022
    “…Besides, the weighted coefficient and centroid algorithm is employed to reduce cumulative error by hop count and cut down computational complexity. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Automated bilateral negotiation with incomplete information in the e-marketplace. by Jazayeriy, Hamid

    Published 2011
    “…In one-side incomplete information problem, comparison between MGT algorithm and smart random trade-offs (SRT) algorithm indicates that MGT outperforms SRT. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Fuzzy parameterized complex multi-fuzzy soft expert set theory and its application in decision-making by Al-Qudah, Yousef Ali Abed, Hassan, Mazlan, Hassan, Nasruddin

    Published 2019
    “…This FP - CMFSES model allows us to validate the information provided by an expert, at a given phase of time, using the properties of complex fuzzy sets. We then construct an algorithm based on this concept by converting it from the complex state to the real state. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Penggunaan penggugusan subtraktif bagi menjana peraturan kabur by Agus Priyono, Muhammad Ridwan, Ahmad Jais Alias, Riza Atiq O. K. Rahmat, Azmi Hassan, Mohd. Alauddin Mohd. Ali

    Published 2005
    “…By using the fuzzy clustering algorithm, membership function could be counted based on two possible clustering methods. …”
    Get full text
    Get full text
    Article
  18. 18

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  19. 19
  20. 20