Search Results - (( process section process algorithm ) OR ( java application using algorithm ))

Refine Results
  1. 1

    Volunteer Management System by Muhammad Fazril Bin Mohd Amin, Muhammad Fazril

    Published 2012
    “…The project will adopt the Iterative and incremental development methodology, which promotes constant reevaluation, and will be built on the java programming language and developed on the Netbeans IDE, for the GUI and algorithm implementation. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  3. 3
  4. 4
  5. 5

    Image pre-processing algorithm for Ficus deltoidea Jack (Moraceae) varietal recognition: a repeated perpendicular line scanning approach by Ahmad Fakhri, Ab. Nasir, M Nordin, A Rahman, Nashriyah, Mat, Abd Rasid, Mamat, Ahmad Shahrizan, Abdul Ghani

    Published 2018
    “…Some of researchers have developed the image pre-processing algorithm to remove petiole section. However, the algorithm was developed using semi-automatic algorithm which is strongly believed to give an inaccurate feature measurement. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6
  7. 7

    Real-Time Video Processing Using Native Programming on Android Platform by Saipullah, Khairul Muzzammil

    Published 2012
    “…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8
  9. 9

    New synchronization protocol for distributed system with TCP extension by Bayat, Peyman

    Published 2013
    “…Faulty processes may cause some other active processes to become inactive during the queuing or within the using a critical section time. …”
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11
  12. 12

    An improvement on the valiantbrebner hypercube data broadcasting technique / Nasaruddin Zenon by Zenon, Nasaruddin

    Published 1990
    “…In Section 3.0 we will propose a modification to the V-B algorithm. …”
    Get full text
    Get full text
    Article
  13. 13
  14. 14
  15. 15

    Real-time algorithmic music composition application. by Yap, Alisa Yi Hui

    Published 2022
    “…This project is about the study of evolutionary music, and focuses on the development of an algorithmic music composer using the Java programming language. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  16. 16

    Performance evaluation of real-time multiprocessor scheduling algorithms by Alhussian, H., Zakaria, N., Abdulkadir, S.J., Fageeri, S.O.

    Published 2016
    “…We hyave used the CPU profiler of Oracle JavaTM VisualVM to monitor the execution of LRE-TL as well as USG algorithms. …”
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17
  18. 18

    An algorithm to measure unsymmetrical circle shape of intravascular ultrasound image using image processing techniques by Kutty, Suhaili Beeran, O. K. Rahmat, Rahmita Wirza, Kassim, Sazzli Shahlan, Madzin, Hizmawati, Hamdan, Hazlina

    Published 2021
    “…However, the measurement only offers by the existing software and some of the software needs human interaction to complete the process. The purpose of this paper is to present the algorithm to measure the region of interest (ROI) on intravascular ultrasound (IVUS) using an image processing technique. …”
    Get full text
    Get full text
    Article
  19. 19
  20. 20

    Loop-based RSA Key Generation Algorithm using String Identity by Norhidayah, Muhammad, Jasni, Mohamad Zain, Md Yazid, Mohd Saman

    Published 2013
    “…Detail explanations of i-RSA algorithm in propose algorithm section. In future, i-RSA algorithm can be improved, so that 100% of email can be a public key. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item