Search Results - (( java implementation real algorithm ) OR ( basic complex selection algorithm ))

Refine Results
  1. 1

    Application of genetic algorithm and JFugue in an evolutionary music generator by Tang, Jia Rou

    Published 2025
    “…This project explores the application of Genetic Algorithms (GA) with JFugue, which is a Java-based music programming library to develop an Evolutionary Music Generator. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  2. 2

    Performance evaluation of real-time multiprocessor scheduling algorithms by Alhussian, H., Zakaria, N., Abdulkadir, S.J., Fageeri, S.O.

    Published 2016
    “…The aim of this evolution is to reflect the unseen time overhead incurred by optimal real-time algorithm, represented by LRE-TL, which might hinder the claimed optimality of such algorithms when they are practically implemented. …”
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework by Asaad Aref, Ibrahim

    Published 2004
    “…A design proposal was outlined to provide an adaptive client/server approach to stream audio contents using Real-Time Transport Protocol (RTP) involving architecture based on the Java Media Framework (JMF) Application Programmable Interfaces (API).RTP protocol is the Internet-standard protocol for the transport of real-time data, including audio and video and can be implemented by using Java Media Framework (JMF). …”
    Get full text
    Get full text
    Thesis
  4. 4

    A Toolkit for Simulation of Desktop Grid Environment by FOROUSHAN, PAYAM CHINI

    Published 2014
    “…A simulator for desktop grid environment has been developed using Java as the implementation language due to its wide popularity. …”
    Get full text
    Get full text
    Final Year Project
  5. 5

    Network game (Literati) / Chung Mei Kuen by Chung, Mei Kuen

    Published 2003
    “…With the powerful networking features of Java applet, it is expected that this project would produce a real game engine. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Route Optimization System by Zulkifli, Abdul Hayy

    Published 2005
    “…Using that process, we have settled on Java as our development platform as we found it able to both implement DA and the GIS component (map display and manipulation). …”
    Get full text
    Get full text
    Final Year Project
  7. 7

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…The proposed protocol implemented in real RFID system outperforms other related protocols because of 13.46 % shorter read time and write time consumed. …”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9
  10. 10

    Enhanced Distributed Learning Classifier System For Simulated Mobile Robot Behaviours by Baneamoon, Saeed Mohammed Saeed

    Published 2010
    “…The simulated robot is tested and results have shown that it performs better with the four basic behaviours. The simulated robot is also tested on many examples of a complex behaviour which is any combination of the four basic behaviours and the results have shown that it performs better with this type of behaviours as well.…”
    Get full text
    Get full text
    Thesis
  11. 11

    Image clustering comparison of two color segmentation techniques by Subramaniam, Kavitha Pichaiyan

    Published 2010
    “…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. The image clustering is major part of data mining where study about how to binds the similar data together in a cluster and show the meaningful data. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    Network monopoly / Tan Kean Yeap by Tan , Kean Yeap

    Published 2002
    “…With the powerful networking features of Java, it is expected that this project would produce a "real" game engine. …”
    Get full text
    Get full text
    Thesis
  13. 13

    IMPLEMENTATION OF BEHAVIOUR BASED NAVIGATION IN A PHYSICALLY CONFINED SITE by ABDUL RAZAK, NUSRAH

    Published 2017
    “…Selected basic behaviour-based algorithms such as wallfollower, obstacle avoidance, escape route and target detection are to be combined and its efficiency is measured. …”
    Get full text
    Get full text
    Final Year Project
  14. 14

    Classroom finder system with student availability, space and time constraint by Loh, Yong Bin

    Published 2024
    “…The project is also aimed to implement real-time management, communication and updates of the assessment and room details to provide instant updates and notifications. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  15. 15

    Priority and dynamic quantum time algorithms for central processing unit scheduling by Mohammed, Maysoon A.

    Published 2018
    “…In excel, a graph has been produced to show the minimum and maximum values of the new dynamic quantum time after setting the parameters of the proposed formula (priority, burst time and the current quantum time). The proposed algorithms (Priority Dynamic Quantum Time and Multi Priority Dynamic Quantum Time Algorithms) are implemented using JAVA programming language and validated using Key Performance Indicators equations. …”
    Get full text
    Get full text
    Thesis
  16. 16

    A detector generating algorithm for intrusion detection inspired by artificial immune system by Alsharafi, Walid Mohamed, Omar, Mohd Nizam

    Published 2015
    “…Artificial immune system (AIS) allows us to inspire several ideas for the design of computer intrusion detection.The standard of negative selection algorithm (NSA), offered by Stephanie Forrest in 1994, is one of the most common mechanisms in AIS that applied in anomaly detection for the similarity of its basic idea. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17
  18. 18

    Data Hiding Techniques In Digital Images by Al Thloothi, Salah Ramadan

    Published 2003
    “…After all these studies, one of the algorithms in the masking technique is developed and implemented using JAVA program to embed message into true color image with a good quality and higher capacity. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Distance measure and its application to decision making, medical diagnosis, and pattern recognition problems under complex picture fuzzy sets by Khan Z., Hussain F., Rahim T., Jan R., Boulaaras S.

    Published 2025
    “…The complex fuzzy sets, complex intuitionistic fuzzy sets, complex pythagorean fuzzy sets, and complex fermatean fuzzy sets cannot handle the neutrality grade of an object that plays an important role in medical diagnosis, network analysis, signal processing, human voting, and personnel selection problems. …”
    Article
  20. 20

    Backtracking search algorithm for optimal power dispatch in power system / Mostafa Modiri Delshad by Mostafa, Modiri Delshad

    Published 2016
    “…Several case studies varied in size and complexity are employed in the power dispatch problems. …”
    Get full text
    Get full text
    Thesis