Search Results - (( java generation process algorithm ) OR ( program implementation a algorithm ))
Search alternatives:
- program implementation »
- generation process »
- process algorithm »
- implementation a »
- java generation »
- a algorithm »
-
1
Application of genetic algorithm and JFugue in an evolutionary music generator
Published 2025“…This project explores the application of Genetic Algorithms (GA) with JFugue, which is a Java-based music programming library to develop an Evolutionary Music Generator. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
2
Application-Programming Interface (API) for Song Recognition Systems
Published 2024“…The main contribution of this paper is the framework of Application Programming Interface (API) to be integrated on a smartphone app. …”
Article -
3
Volunteer Management System
Published 2012“…The project will adopt the Iterative and incremental development methodology, which promotes constant reevaluation, and will be built on the java programming language and developed on the Netbeans IDE, for the GUI and algorithm implementation. …”
Get full text
Get full text
Final Year Project -
4
Web-based expert system for material selection of natural fiber- reinforced polymer composites
Published 2015“…Secondly, an expert system using Java programming technology with two tiers of search engine was developed to perform a fast selection of candidate materials in huge volume. …”
Get full text
Get full text
Thesis -
5
Direct approach for mining association rules from structured XML data
Published 2012“…The proposed method, XiFLEX has been implemented using two different techniques (java based & XQuery) and compared with the original FLEX algorithm in its basic implementation and the Apriori algorithm for frequent patterns generation. …”
Get full text
Get full text
Thesis -
6
Café Web Based System Using Priority Scheduling Approach
Published 2017“…The priority scheduling algorithm is based on Control Processing Unit scheduling algorithm where it has a priority to execute tasks. …”
Get full text
Get full text
Conference or Workshop Item -
7
Route Optimization System
Published 2005“…After much research into the many algorithms available, and considering some, including Genetic Algorithm (GA), the author selected Dijkstra's Algorithm (DA). …”
Get full text
Get full text
Final Year Project -
8
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
Get full text
Get full text
Get full text
Article -
9
Fuzzy modeling using Bat Algorithm optimization for classification
Published 2018“…Fuzzy modeling is a process of generating parameters which are fuzzy rule and membership function. …”
Get full text
Get full text
Get full text
Undergraduates Project Papers -
10
Pairwise testing tools based on hill climbing algorithm (PTCA)
Published 2014“…To reduce the test cases generated during testing process, combinatorial algorithms which consisting Hill Climbing algorithm and T Way Combination algorithm as described in twayGenerator (Kamal Zuhairi Zamli, 2007) have been studied and reviewed. …”
Get full text
Get full text
Undergraduates Project Papers -
11
Message based random variable length key encryption algorithm.
Published 2009“…Results: Attack on the key generation process was prevented because of random key generation and its dependency to input message. …”
Get full text
Get full text
Article -
12
Java based expert system for selection of natural fibre composite materials
Published 2013“…Many research papers are published in the field of materials selection for manufacturing process and design of polymer composite materials. …”
Get full text
Get full text
Get full text
Article -
13
Automatic generation of content security policy to mitigate cross site scripting
Published 2016“…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. …”
Get full text
Get full text
Conference or Workshop Item -
14
Securing cloud data system (SCDS) for key exposure using AES algorithm
Published 2021“…The website tested by many users that use to register and upload them own data and files using them own e-mails and the unique key that generated after completing the registration. We used to insure for the users data and files in our website by checking the process of our generated system (SCDS) and we got match results for the same files in case of encryption and decryption process.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
15
Implementation of Autonomous Vehicle Navigation Algorithms Using Event-Driven Programming
Published 2012“…The algorithm can be relatively easy translated to a suitable program with event-driven programming technique. …”
Get full text
Get full text
Conference or Workshop Item -
16
Implementation of autonomous vehicle navigation algorithms using event-driven programming
Published 2012“…The algorithm can be relatively easy translated to a suitable program with event-driven programming technique. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
17
Evaluation of the effectiveness and efficiency of Wagner and Fischer algorithm in retrieving Hadith translated documents / Kamarul Arifin Muhamad
Published 2002“…The method has been implemented as a C programming language. In this study, Wagner and Fischer algorithm, Hadith test collection that consists of Malay Hadith translation documents, query words and relevant judgements are used. …”
Get full text
Get full text
Thesis -
18
Implementation of Color Filtering on FPGA
Published 2007“…The chosen image processing algorithm is a single Color Filtering algorithm. This work utilizes Altera DE2 development board empowered by the Cyclone II FPGA paired with a 1.3 Mega pixel CMOS camera from Terasik Technologies. …”
Get full text
Get full text
Conference or Workshop Item -
19
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…An Intrusion Detection System is software or application which is used to detect thread, malicious activities and the unauthorized access to the computer system and warn the administrators by generating alarms. Features selection process can be considered a problem of global combinatorial optimization in machine learning. …”
Get full text
Get full text
Thesis -
20
Simulation of shortest path using a-star algorithm / Nurul Hani Nortaja
Published 2004“…The steps to calculate a shortest path using A • algorithm is shown by using appropriate examples and related figures. …”
Get full text
Get full text
Thesis
