Search Results - (( java application using algorithm ) OR ( using compensation practices algorithm ))*

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    Determining optimal location of static VAR compensator by means of genetic algorithm by Karami, Mahdi, Mariun, Norman, Ab Kadir, Mohd Zainal Abidin

    Published 2011
    “…The purpose of this paper is to study a practical and accurate heuristic method known as genetic algorithm (GA) which is used to find the optimal location of Static Var Compensator (SVC) and its appropriate size and setting. …”
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3
  4. 4
  5. 5

    Enhancing indoor positioning service for location based internet of things (IoT): a source selecting approach with error compensation by Chui, Yew Leong, Perumal, Thinagaran, Yaakob, Razali, Kwan, Wei Peng

    Published 2017
    “…An error compensation algorithm also will be applied to eliminate the false signal which will affect the system's accuracy. …”
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    Management support as a moderator in the HR practices employee performance relationship by Jibrin Bida, Mohammed, Abdul Majid, Abdul Halim, Ismail, AbdussalaamIyanda

    Published 2017
    “…Partial Least Squares Method (PLS) algorithm and bootstrap techniques were used to test the study’s hypotheses. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Real-Time Video Processing Using Native Programming on Android Platform by Saipullah, Khairul Muzzammil

    Published 2012
    “…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8
  9. 9

    Real-time algorithmic music composition application. by Yap, Alisa Yi Hui

    Published 2022
    “…This project is about the study of evolutionary music, and focuses on the development of an algorithmic music composer using the Java programming language. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  10. 10
  11. 11

    Performance evaluation of real-time multiprocessor scheduling algorithms by Alhussian, H., Zakaria, N., Abdulkadir, S.J., Fageeri, S.O.

    Published 2016
    “…We hyave used the CPU profiler of Oracle JavaTM VisualVM to monitor the execution of LRE-TL as well as USG algorithms. …”
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12
  13. 13

    Application of genetic algorithm and JFugue in an evolutionary music generator by Tang, Jia Rou

    Published 2025
    “…This project explores the application of Genetic Algorithms (GA) with JFugue, which is a Java-based music programming library to develop an Evolutionary Music Generator. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  14. 14
  15. 15
  16. 16

    Route Optimization System by Zulkifli, Abdul Hayy

    Published 2005
    “…The method used to develop this project is Rapid Application Development (RAD). …”
    Get full text
    Get full text
    Final Year Project
  17. 17

    Hybridizing Invasive Weed Optimization with Firefly Algorithm for Unconstrained and Constrained Optimization Problems by Hyreil A., Kasdirin, N. M., Yahya, M. S. M., Aras, Tokhi, M. O.

    Published 2017
    “…This study presents a hybrid invasive weed firefly optimization (HIWFO) algorithm for global optimization problems. Unconstrained and constrained optimization problems with continuous design variables are used to illustrate the effectiveness and robustness of the proposed algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…Diffie-Hellman algorithm is used to determine the pixel on an image that will be used to store the message. …”
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19

    A Novel Practical Synchronization Control Approach For A Twin-Axes Table Driven System In Industrial Transportation by Chong, Shin Horng, Hassan, Mohd Khair, Loh, Ser Lee, Md Nawawi, Mohamad Riduwan, Selamat, Hazlina

    Published 2019
    “…In addition, another novel algorithm in the controller is the incorporation of the acceleration feedforward compensation that useful to reduce the synchronization error. …”
    Get full text
    Get full text
    Get full text
    Technical Report
  20. 20

    A Toolkit for Simulation of Desktop Grid Environment by FOROUSHAN, PAYAM CHINI

    Published 2014
    “…The prototypes will be developed using JAVA language united with a MySQL database. …”
    Get full text
    Get full text
    Final Year Project