Search Results - (( java implementation a algorithm ) OR ( ((data solution) OR (total solution)) using algorithm ))

Refine Results
  1. 1

    Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework by Asaad Aref, Ibrahim

    Published 2004
    “…A design proposal was outlined to provide an adaptive client/server approach to stream audio contents using Real-Time Transport Protocol (RTP) involving architecture based on the Java Media Framework (JMF) Application Programmable Interfaces (API).RTP protocol is the Internet-standard protocol for the transport of real-time data, including audio and video and can be implemented by using Java Media Framework (JMF). …”
    Get full text
    Get full text
    Thesis
  2. 2

    Heavy Transportation Shortest Route using Dijkstra’s algorithm (HETRO) / Nurul Aqilah Ahmad Nezer by Ahmad Nezer, Nurul Aqilah

    Published 2017
    “…The development tools used in developing this project is NetBeans by using Java for the implementation of the coding. The methodology that used for developing this system is the Dijkstra’s algorithm. …”
    Get full text
    Get full text
    Thesis
  3. 3

    SANAsms: Secure short messaging system for secure GSM mobile communication by Anuar, N.B., Azlan, I.M., Wahid, A.W.A., Zakaria, O.

    Published 2008
    “…One of the solutions is to have a security application implemented in mobile phone device. …”
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    Batch mode heuristic approaches for efficient task scheduling in grid computing system by Maipan-Uku, Jamilu Yahaya

    Published 2016
    “…We simulate our proposed algorithms using a Java based simulator that is purposedly built for Grid computing simulations. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6

    Hardware Software Partitioning Using Particle Swarm Optimization (PSO) In Image Processing Application by Tan, Jia Zheng

    Published 2018
    “…Three different constraints value, C=1022, C=681 and C=341 are take into consideration to generate an optimum solution. The solution for C=1022 use 55% of the total hardware resources (1362) in pure hardware. …”
    Get full text
    Get full text
    Monograph
  7. 7

    Network reconfiguration and control for loss reduction using genetic algorithm by Jawad, Mohamed Hassan Izzaldeen

    Published 2010
    “…While in the 49-bus system the existing 7 capacitors are rearrange using Genetic Algorithm in obtaining minimal total power losses. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Vehicle routing problem with pick-up and delivery using genetic algorithm / Muhammad Shahfiq Zazali and Wan Muhamad Nasrin Aiman Mat Soti by Zazali, Muhammad Shahfiq, Mat Soti, Wan Muhamad Nasrin Aiman

    Published 2022
    “…The most optimal solution for the data used is 233641.009 calculated using a software that uses the Ruin and Recreate principle. …”
    Get full text
    Get full text
    Student Project
  9. 9
  10. 10

    Variable Neighbourhood Search Algorithm for Vehicle Routing Problem with Backhaul by Siaw Ying Doreen, Sek

    Published 2023
    “…The VNS algorithm is used to improve the obtained solutions in the improvement phase. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption by Yeo Zi Zian

    Published 2022
    “…The selected lightweight geo-encryption algorithm will be implemented in the proposed system, vi which develops by using Java language. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  12. 12

    Network monopoly / Tan Kean Yeap by Tan , Kean Yeap

    Published 2002
    “…The algorithm design and implementation method mustnot only be workable, but also highly efficient in terms of execution speed and respond time. …”
    Get full text
    Get full text
    Thesis
  13. 13

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…The key is the trigger mechanism to the algorithm. Until the advent of the Internet, encryption was rarely used by the public, but was largely a military tool. …”
    Get full text
    Get full text
    Final Year Project
  14. 14

    The solution of 2048 puzzle game using A* algorithm / Zafhira Ismail by Ismail, Zafhira

    Published 2017
    “…The output of this project is the best solution to achieve the goal using A* algorithm. This project use usability test for user testing system and functionality test to evaluate the efficiency of the game. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Hybrid tabu search – strawberry algorithm for multidimensional knapsack problem by Wong, Jerng Foong

    Published 2022
    “…Next, the solution was enhanced by using the hybrid TS-SBA. The parameters setting to run the hybrid TS-SBA was determined by using a combination of Factorial Design of Experiments and Decision Tree Data Mining methods. …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Smart student timetable planner by Wong, Xin Tong

    Published 2025
    “…A Genetic Algorithm forms the core scheduling engine, generating optimized timetables that respect both hard constraints, such as avoiding clashes, and soft constraints, such as personal preferences.The final output of this project is a functional web-based timetable planner that successfully enhances scheduling efficiency, reduces the likelihood of errors, and improves the overall academic planning experience. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  18. 18

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    Mapping of hydrocarbon with marine EM method using 2-D forward modeling by Hussain, Nazabat, Karsiti , Mohd Noh, Yahya, Norashikin, Burhanudin, Zainal Arif

    Published 2011
    “…This paper present two-dimensional forward modeling of marine controlled-source electromagnetic data for the purpose of hydrocarbon mapping. The forward algorithm employs a staggered-grid finite difference solution to the total Helmholtz equation. …”
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20

    Provider independent cryptographic tools by Ibrahim, Subariah, Salleh, Mazleena, Abdul Aziz, Shah Rizan

    Published 2003
    “…The library is implemented by using Java cryptographic service provider framework that conforms to Java Cryptographic Architecture (JCA) and Java Cryptographic Extension (JCE). …”
    Get full text
    Get full text
    Get full text
    Monograph