Search Results - (( process generation new algorithm ) OR ( java application using algorithm ))

Refine Results
  1. 1

    Application of genetic algorithm and JFugue in an evolutionary music generator by Tang, Jia Rou

    Published 2025
    “…This project explores the application of Genetic Algorithms (GA) with JFugue, which is a Java-based music programming library to develop an Evolutionary Music Generator. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  2. 2

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…Even though it makes use of the existing technology, this approach is often time consuming and involves manual intervention because of the mapping process. The focus of this study is to propose an enhancement on memory consumption by reducing the number of candidates generated for the existing FLEX algorithm which will reduce the amount of memory needed to execute the algorithm. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Message based random variable length key encryption algorithm. by Mirvaziri, Hamid, Jumari, Kasmiran, Ismail, Mahamod, Mohd Hanapi, Zurina

    Published 2009
    “…Results: Attack on the key generation process was prevented because of random key generation and its dependency to input message. …”
    Get full text
    Get full text
    Article
  4. 4

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  5. 5
  6. 6
  7. 7

    Generation of new low-complexity March algorithms for optimum faults detection in SRAM by Jidin, Aiman Zakwan, Hussin, Razaidi, Lee, Weng Fook, Mispan, Mohd Syafiq, Zakaria, Nor Azura, Loh, Wan Ying, Zamin, Norshuhani

    Published 2023
    “…This article presents a method to generate new March algorithms that provide optimum coverage on faults introduced by the nanometer process technologies. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Multiple case-based retrieval for university course timetabling problem by Hong, Siaw Theng

    Published 2016
    “…The case-based retrieval technique is further enhanced and improvised into a new algorithm known as Multiple Case-based Retrieval. …”
    Get full text
    Get full text
    Thesis
  9. 9

    A hybrid kidney algorithm strategy for combinatorial interaction testing problem by Ameen Ali, Mohammed Ba Homaid

    Published 2022
    “…HKA addresses the limitations in KA by improving the algorithm's exploration and exploitation processes by hybridizing KA with mutation operator, and improve the balancing control process by enhancing the filtration process in KA. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Contour generation for mask projection stereolithography 3D printing by Faeiz Azizi, Adnan

    Published 2019
    “…Thus, a real-time contour generation algorithm is presented in this research. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Enhance efficiency of answering XML keyword query using incompact structure of MCCTree by Sazaly, Ummu Sulaim

    Published 2012
    “…This study is a response to these weaknesses. This study proposes a new algorithm, namely XMCCTreeGenerator, to enhance the efficiency of the CGTree- MCCTreeGenerator. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Stereolithography 3D printing development of 3D printing machine controller using the predefined closest-distance volume interpolator system by -, -

    Published 2019
    “…Thus, a real-time contour generation algorithm is presented in this research. …”
    Get full text
    Get full text
    Research Report
  13. 13

    A New Approach To The Solution Of Economic Dispatch Using Genetic Algorithm by Al-Shetwi, Ali Q., Alomoush, Muwaffaq I.

    Published 2016
    “…Economic dispatch is the process of finding the optimal generation scheduling of a number of electricity generation facilities to meet the load of the system at lowest possible cost, subject to transmission and operational constraints on the system. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    The normalized random map of gradient for generating multifocus image fusion by Ismail, ., Kamarul Hawari, Ghazali

    Published 2020
    “…Furthermore, they get difficulties to create the new one. In order to handle this problem, the proposed method a concise algorithm which is able to generate an accurate fused image without using a complicated mathematical equation and tough algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Real-Time Video Processing Using Native Programming on Android Platform by Saipullah, Khairul Muzzammil

    Published 2012
    “…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    New Cryptographic Algorithms for Enhancing Security of Voice Data by Al-Hazaimeh, Obaida Mohammad Awad

    Published 2010
    “…In this research, a new keys is generated in a random fashion and then used to encrypt each new voice packet to strengthen the security level. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    Comparison between starter sets generation method for listing all permutations by Karim, Sharmila, Ibrahim, Haslinda, Omar, Zurni

    Published 2013
    “…distinct permutations is an exhaustive process.Using starter set, the process of listing the permutations becomes easy.However a problem arises when the equivalence starter sets will generate the similar permutation and needed to be discarded.Two new recursive strategies are proposed to generate starter sets without generating equivalence starter sets namely circular and exchange two elements operation.Once the starter sets are obtained, the circular and reverse of circular operation are employed to produce distinct permutation from each starter sets.Computational advantages are presented comparing the results obtained by the new method with two other existing methods.The result indicates that the exchange two elements based strategy is faster than the circular based.Overall all new algorithms are better than existing algorithms in time execution.…”
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18

    Loop-based RSA Key Generation Algorithm using String Identity by Norhidayah, Muhammad, Jasni, Mohamad Zain, Md Yazid, Mohd Saman

    Published 2013
    “…The differences between i-RSA and previous algorithm are looping process in key generation, to get new value of p and q parameter, looping process will stop when value of k is equal to 1, and the email can be a public key. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19

    Enhance key generation algorithm based user string identity as public key by Norhidayah, Muhammad

    Published 2015
    “…In the first experiment, an algorithm called the LB-RSA was developed. A looping process was added to this algorithm in order to produce a new modulo value to make the E-mail entered relative prime to the new modulo value, which helps to produce more E-mail addresses that can be used as public keys. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Real-time algorithmic music composition application. by Yap, Alisa Yi Hui

    Published 2022
    “…This project is about the study of evolutionary music, and focuses on the development of an algorithmic music composer using the Java programming language. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis