Search Results - (( probable distributed modified algorithm ) OR ( java application using algorithm ))

Refine Results
  1. 1

    Winsorize tree algorithm for handling outliers in classification problem by Ch’ng, Chee Keong

    Published 2016
    “…This study proposes a modified classification tree algorithm called Winsorize tree based on the distribution of classes in the training dataset. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    Fair bandwidth distribution marking and scheduling algorithm in network traffic classification by Al-Kharasani, Ameen Mohammed Abdulkarem

    Published 2019
    “…Additionally, the traffic are relying on the markers and scheduling algorithms to the service classes at the routers. The higher level priority agreements give a higher or equal probability than the lower level, this technique is perfect at a core router by scheduling algorithm. …”
    Get full text
    Get full text
    Thesis
  3. 3

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  4. 4
  5. 5
  6. 6

    Stochastic And Modified Sequent Peak Algorithm For Reservoir Planning Analysis Considering Performance Indices by Oskoui, Issa Saket

    Published 2016
    “…The tests are implemented for testing consistency, stationarity, randomness and determining the most appropriate probability distribution function of the historical data. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Parameter estimation of Kumaraswamy Burr type X models based on cure models with or without covariates by Yusuf, Madaki Umar

    Published 2017
    “…Kumaraswamy distribution has a closed form of probability density function (PDF) and CDF, which makes it tractable. …”
    Get full text
    Get full text
    Thesis
  8. 8

    An improvement on the valiantbrebner hypercube data broadcasting technique / Nasaruddin Zenon by Zenon, Nasaruddin

    Published 1990
    “…In section 1.0 a description of the hypercube topological characteristics will be given which can be used to modify the algorithm. Section 2.0 provides the description of the Valiant and Brebner (V-B) algorithm. …”
    Get full text
    Get full text
    Article
  9. 9

    Real-Time Video Processing Using Native Programming on Android Platform by Saipullah, Khairul Muzzammil

    Published 2012
    “…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10
  11. 11
  12. 12

    Real-time algorithmic music composition application. by Yap, Alisa Yi Hui

    Published 2022
    “…This project is about the study of evolutionary music, and focuses on the development of an algorithmic music composer using the Java programming language. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  13. 13

    Performance evaluation of real-time multiprocessor scheduling algorithms by Alhussian, H., Zakaria, N., Abdulkadir, S.J., Fageeri, S.O.

    Published 2016
    “…We hyave used the CPU profiler of Oracle JavaTM VisualVM to monitor the execution of LRE-TL as well as USG algorithms. …”
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14
  15. 15

    Application of genetic algorithm and JFugue in an evolutionary music generator by Tang, Jia Rou

    Published 2025
    “…This project explores the application of Genetic Algorithms (GA) with JFugue, which is a Java-based music programming library to develop an Evolutionary Music Generator. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  16. 16
  17. 17
  18. 18

    Route Optimization System by Zulkifli, Abdul Hayy

    Published 2005
    “…The method used to develop this project is Rapid Application Development (RAD). …”
    Get full text
    Get full text
    Final Year Project
  19. 19

    Application of Mellin-Kamal transformation in EL Gamal Ciphertext Cryptosystem / Nurul Syazwani Husairi and Nurul Aqilah Mohd Fauzi by Husairi, Nurul Syazwani, Mohd Fauzi, Nurul Aqilah

    Published 2023
    “…So, this study contributed to show a complete calculation and working to assist other future researchers know the complete step of the proposed scheme and reduce the probability of middle attackers and strengthen the existing algorithm with several cryptosystem integration. …”
    Get full text
    Get full text
    Student Project
  20. 20

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…Diffie-Hellman algorithm is used to determine the pixel on an image that will be used to store the message. …”
    Get full text
    Get full text
    Conference or Workshop Item