Search Results - (( process generation new algorithm ) OR ( java application using algorithm ))
Search alternatives:
- process generation »
- java application »
- using algorithm »
- generation new »
- new algorithm »
-
1
Application of genetic algorithm and JFugue in an evolutionary music generator
Published 2025“…This project explores the application of Genetic Algorithms (GA) with JFugue, which is a Java-based music programming library to develop an Evolutionary Music Generator. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
2
Direct approach for mining association rules from structured XML data
Published 2012“…Even though it makes use of the existing technology, this approach is often time consuming and involves manual intervention because of the mapping process. The focus of this study is to propose an enhancement on memory consumption by reducing the number of candidates generated for the existing FLEX algorithm which will reduce the amount of memory needed to execute the algorithm. …”
Get full text
Get full text
Thesis -
3
Message based random variable length key encryption algorithm.
Published 2009“…Results: Attack on the key generation process was prevented because of random key generation and its dependency to input message. …”
Get full text
Get full text
Article -
4
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
5
-
6
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
7
Generation of new low-complexity March algorithms for optimum faults detection in SRAM
Published 2023“…This article presents a method to generate new March algorithms that provide optimum coverage on faults introduced by the nanometer process technologies. …”
Get full text
Get full text
Get full text
Article -
8
Multiple case-based retrieval for university course timetabling problem
Published 2016“…The case-based retrieval technique is further enhanced and improvised into a new algorithm known as Multiple Case-based Retrieval. …”
Get full text
Get full text
Thesis -
9
A hybrid kidney algorithm strategy for combinatorial interaction testing problem
Published 2022“…HKA addresses the limitations in KA by improving the algorithm's exploration and exploitation processes by hybridizing KA with mutation operator, and improve the balancing control process by enhancing the filtration process in KA. …”
Get full text
Get full text
Thesis -
10
Contour generation for mask projection stereolithography 3D printing
Published 2019“…Thus, a real-time contour generation algorithm is presented in this research. …”
Get full text
Get full text
Thesis -
11
Enhance efficiency of answering XML keyword query using incompact structure of MCCTree
Published 2012“…This study is a response to these weaknesses. This study proposes a new algorithm, namely XMCCTreeGenerator, to enhance the efficiency of the CGTree- MCCTreeGenerator. …”
Get full text
Get full text
Thesis -
12
Stereolithography 3D printing development of 3D printing machine controller using the predefined closest-distance volume interpolator system
Published 2019“…Thus, a real-time contour generation algorithm is presented in this research. …”
Get full text
Get full text
Research Report -
13
A New Approach To The Solution Of Economic Dispatch Using Genetic Algorithm
Published 2016“…Economic dispatch is the process of finding the optimal generation scheduling of a number of electricity generation facilities to meet the load of the system at lowest possible cost, subject to transmission and operational constraints on the system. …”
Get full text
Get full text
Get full text
Article -
14
The normalized random map of gradient for generating multifocus image fusion
Published 2020“…Furthermore, they get difficulties to create the new one. In order to handle this problem, the proposed method a concise algorithm which is able to generate an accurate fused image without using a complicated mathematical equation and tough algorithm. …”
Get full text
Get full text
Get full text
Article -
15
Real-Time Video Processing Using Native Programming on Android Platform
Published 2012“…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
16
New Cryptographic Algorithms for Enhancing Security of Voice Data
Published 2010“…In this research, a new keys is generated in a random fashion and then used to encrypt each new voice packet to strengthen the security level. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
17
Comparison between starter sets generation method for listing all permutations
Published 2013“…distinct permutations is an exhaustive process.Using starter set, the process of listing the permutations becomes easy.However a problem arises when the equivalence starter sets will generate the similar permutation and needed to be discarded.Two new recursive strategies are proposed to generate starter sets without generating equivalence starter sets namely circular and exchange two elements operation.Once the starter sets are obtained, the circular and reverse of circular operation are employed to produce distinct permutation from each starter sets.Computational advantages are presented comparing the results obtained by the new method with two other existing methods.The result indicates that the exchange two elements based strategy is faster than the circular based.Overall all new algorithms are better than existing algorithms in time execution.…”
Get full text
Get full text
Conference or Workshop Item -
18
Loop-based RSA Key Generation Algorithm using String Identity
Published 2013“…The differences between i-RSA and previous algorithm are looping process in key generation, to get new value of p and q parameter, looping process will stop when value of k is equal to 1, and the email can be a public key. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
19
Enhance key generation algorithm based user string identity as public key
Published 2015“…In the first experiment, an algorithm called the LB-RSA was developed. A looping process was added to this algorithm in order to produce a new modulo value to make the E-mail entered relative prime to the new modulo value, which helps to produce more E-mail addresses that can be used as public keys. …”
Get full text
Get full text
Thesis -
20
Real-time algorithmic music composition application.
Published 2022“…This project is about the study of evolutionary music, and focuses on the development of an algorithmic music composer using the Java programming language. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis
