Search Results - (( java implementing software algorithm ) OR ( java operation research algorithm ))
Search alternatives:
- implementing software »
- software algorithm »
- research algorithm »
- java implementing »
- java operation »
-
1
Face recognition and identification system (FaceRec) / Khew Jye Huei
Published 2004“…Besides that, the system will build in Windows 2000 Professional Operating System. The project approaches the research and development process as a two dimensional recognition problem, capturing the face image by using the web camera. …”
Get full text
Get full text
Thesis -
2
Priority and dynamic quantum time algorithms for central processing unit scheduling
Published 2018“…Central Processing Unit is scheduled using different types of scheduling algorithms. One of the most widely algorithm used in scheduling with sharing and batch operating systems is Round Robin. …”
Get full text
Get full text
Thesis -
3
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…During early stages, the research is emphasis more towards designing a robotic system using RoboLab software and C++ programming language. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
4
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis -
5
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis -
6
Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption
Published 2022“…The selected lightweight geo-encryption algorithm will be implemented in the proposed system, vi which develops by using Java language. …”
Get full text
Get full text
Get full text
Academic Exercise -
7
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
8
Provider independent cryptographic tools
Published 2003“…The library is implemented by using Java cryptographic service provider framework that conforms to Java Cryptographic Architecture (JCA) and Java Cryptographic Extension (JCE). …”
Get full text
Get full text
Get full text
Monograph -
9
Pairwise testing tools based on hill climbing algorithm (PTCA)
Published 2014“…The actual implementation of the algorithm which is in Java programming language, the program is implemented on Net Bean 7.0.1. …”
Get full text
Get full text
Undergraduates Project Papers -
10
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014Get full text
Get full text
Undergraduates Project Papers -
11
Automatic Number Plate Recognition on android platform: With some Java code excerpts
Published 2016“…The main challenges of implementing ANPR algorithm on mobile phone are how to produce a higher coding efficiency, lower computational complexity, and higher scalability. …”
Get full text
Get full text
Get full text
Book -
12
Route Optimization System
Published 2005“…Using that process, we have settled on Java as our development platform as we found it able to both implement DA and the GIS component (map display and manipulation). …”
Get full text
Get full text
Final Year Project -
13
Café Web Based System Using Priority Scheduling Approach
Published 2017Get full text
Get full text
Conference or Workshop Item -
14
An approach for cross-site scripting detection and removal based on genetic algorithms.
Published 2014“…The proposed approach is, so far, only implemented and validated on Java-based Web applications, although it can be implemented in other programming languages with slight modifications. …”
Get full text
Get full text
Conference or Workshop Item -
15
A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment
Published 2013“…The proposed algorithm is able to improve the weaknesses in PQF model in updating and learning the important attributes for software quality assessment. …”
Get full text
Get full text
Get full text
Thesis -
16
Design and Implementation of Data-at-Rest Encryption for Hadoop
Published 2017“…Therefore, the AES encryption algorithm has been implemented in HDFS to ensure the security of data stored in HDFS. …”
Get full text
Get full text
Conference or Workshop Item -
17
-
18
-
19
Movie recommendation system / Najwa Syamimie Hasnu
Published 2020Get full text
Get full text
Thesis -
20
Fuzzy modeling using Bat Algorithm optimization for classification
Published 2018Get full text
Get full text
Get full text
Undergraduates Project Papers
