Search Results - (( java implementation success algorithm ) OR ( using data based algorithm ))

Refine Results
  1. 1

    Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework by Asaad Aref, Ibrahim

    Published 2004
    “…A design proposal was outlined to provide an adaptive client/server approach to stream audio contents using Real-Time Transport Protocol (RTP) involving architecture based on the Java Media Framework (JMF) Application Programmable Interfaces (API).RTP protocol is the Internet-standard protocol for the transport of real-time data, including audio and video and can be implemented by using Java Media Framework (JMF). …”
    Get full text
    Get full text
    Thesis
  2. 2

    Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system by Beg, Abul Hashem

    Published 2011
    “…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Smart student timetable planner by Wong, Xin Tong

    Published 2025
    “…A Genetic Algorithm forms the core scheduling engine, generating optimized timetables that respect both hard constraints, such as avoiding clashes, and soft constraints, such as personal preferences.The final output of this project is a functional web-based timetable planner that successfully enhances scheduling efficiency, reduces the likelihood of errors, and improves the overall academic planning experience. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  4. 4

    Pairwise testing tools based on hill climbing algorithm (PTCA) by Lim, Seng Kee

    Published 2014
    “…The actual implementation of the algorithm which is in Java programming language, the program is implemented on Net Bean 7.0.1. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  5. 5

    A Toolkit for Simulation of Desktop Grid Environment by FOROUSHAN, PAYAM CHINI

    Published 2014
    “…A simulator for desktop grid environment has been developed using Java as the implementation language due to its wide popularity. …”
    Get full text
    Get full text
    Final Year Project
  6. 6

    Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC by Ismail, Haqi Khalid

    Published 2021
    “…A new multi-factor authentication scheme is designed using the AES-ECC algorithm based on Kerberos workflow to establish secure, efficient, and lightweight communication between the user and the targeted IIoT devices to avoid the issues. …”
    Get full text
    Get full text
    Thesis
  7. 7

    An approach for cross-site scripting detection and removal based on genetic algorithms. by Hydara, Isatou, Md Sultan, Abu Bakar, Zulzalil, Hazura, Admodisastro, Novia

    Published 2014
    “…The proposed approach is, so far, only implemented and validated on Java-based Web applications, although it can be implemented in other programming languages with slight modifications. …”
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8
  9. 9

    Cross-site scripting detection based on an enhanced genetic algorithm by Hydara, Isatou, Md Sultan, Abu Bakar, Zulzalil, Hazura, Admodisastro, Novia Indriaty

    Published 2015
    “…The proposed approach is, so far, only implemented and validated on Java-based Web applications, although it can be implemented in other programming languages with slight modifications. …”
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    Comparison of performances of Jaya Algorithm and Cuckoo Search algorithm using benchmark functions by Ahmed, Mashuk, Nasser, Abdullah B., Kamal Z., Zamli, Heripracoyo, Sulistyo

    Published 2022
    “…CS and JA have implemented in the same platform (Intellij IDEA Community Edition 2020.2.3) using the same language (Java). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    Path planning for unmanned aerial vehicle (UAV) using rotated accelerated method in static outdoor environment by Shaliza Hayati A. Wahab, Nordin Saad, Azali Saudi, Ali Chekima

    Published 2021
    “…In this study, a fast iterative method known as Rotated Successive Over-Relaxation (RSOR) is introduced. The algorithm is implemented in a self-developed 2D Java tool, UAV Planner. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Priority and dynamic quantum time algorithms for central processing unit scheduling by Mohammed, Maysoon A.

    Published 2018
    “…In excel, a graph has been produced to show the minimum and maximum values of the new dynamic quantum time after setting the parameters of the proposed formula (priority, burst time and the current quantum time). The proposed algorithms (Priority Dynamic Quantum Time and Multi Priority Dynamic Quantum Time Algorithms) are implemented using JAVA programming language and validated using Key Performance Indicators equations. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Design & Development of a Robotic System Using LEGO Mindstorm by Abd Manap, Nurulfajar, Md Salim, Sani Irwan, Haron, Nor Zaidi

    Published 2006
    “…A prototype of a mobile robot based on Lego successfully implemented by using PIC and can be controlled through voice recognition. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14

    Cluster Analysis of Data Points using Partitioning and Probabilistic Model-based Algorithms by Raheem, Ajiboye Adeleke, Hauwau, Isah-Kebbe, O., Oladele Tinuke

    Published 2014
    “…This study explores the performance accuracies of partitioning-based algorithms and probabilistic model-based algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Image Encrytion Using Block Based Transformation Algorithm by Bani Younes, Mohammad Ali, Jantan, Aman

    Published 2008
    “…Most of the available encryption algorithms are mainly used for textual data and may not be suitable for multimedia data such as images. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    A study of density-grid based clustering algorithms on data streams by Amini, A., Saybani, M.R., Sahaf Yazdi, S.R.A.

    Published 2011
    “…In this paper we review the grid based clustering algorithms that use density-based algorithms or density concept for the clustering. …”
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17

    Clustering Spatial Data Using a Kernel-Based Algorithm by Awan, A. Majid, Md. Sap, Mohd. Noor

    Published 2005
    “…Therefore, this work comes up with new clustering algorithm using kernel-based methods for effective and efficient data analysis by exploring structures in the data.…”
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18

    On density-based data streams clustering algorithms: A survey by Teh, Y.W.

    Published 2017
    “…Recently, a lot of density-based clustering algorithms are extended for data streams. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19

    Clustering chemical data set using particle swarm optimization based algorithm by Triyono, Triyono

    Published 2008
    “…We found that PSO algorithm reveals better performance than Ward’s algorithm on continuous data format; however for binary data format, Ward’s algorithm outperforms arrogantly.…”
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    Predicting future sales using genetic algorithm: data mining sales / Siti Hajar Yaacob by Yaacob, Siti Hajar

    Published 2014
    “…Besides that, Genetic Algorithm is applying to predict future sales based on the sales and product data. …”
    Get full text
    Get full text
    Thesis