Search Results - (( process simulation approach algorithm ) OR ( java application system algorithm ))

Refine Results
  1. 1

    Challenges of hidden data in the unused area two within executable files by Naji, Ahmed Wathik, Zaidan, A.A., Zaidan, B.B.

    Published 2009
    “…Conclusion: Features of the short-term responses were simulated that the size of the hidden data does depend on the size of the unused area2 within cover file which is equal 20% from the size of exe.file before hiding process, most antivirus systems do not allow direct write in executable file, so the approach of the proposed system is to prevent the hidden information to observation of these systems and the exe.file still function as usual after the hiding process. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2
  3. 3
  4. 4
  5. 5

    Process Planning Optimization In Reconfigurable Manufacturing Systems by Musharavati, Farayi

    Published 2008
    “…The five (5) AADTs include; a variant of the simulated annealing algorithm that implements heuristic knowledge at critical decision points, two (2) cooperative search schemes based on a “loose hybridization” of the Boltzmann Machine algorithm with (i) simulated annealing, and (ii) genetic algorithm search techniques, and two (2) modified genetic algorithms. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    Real-time algorithmic music composition application. by Yap, Alisa Yi Hui

    Published 2022
    “…In addition, the system also utilises JavaFx and jFugue for its graphical user interface and music programming respectively. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  8. 8

    Route Optimization System by Zulkifli, Abdul Hayy

    Published 2005
    “…After much research into the many algorithms available, and considering some, including Genetic Algorithm (GA), the author selected Dijkstra's Algorithm (DA). …”
    Get full text
    Get full text
    Final Year Project
  9. 9
  10. 10
  11. 11

    Non-probabilistic approach to cooperative position tracking in large swarm of simple mobile robots using triangular cross-observation by Din, Abdul Sattar

    Published 2013
    “…The performance of the algorithm was validated and compared against that of the EKF through series of simulations using Stage multi-agent simulator. …”
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13

    Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework by Asaad Aref, Ibrahim

    Published 2004
    “…Java Media Framework library and the RTP protocol for audio transmission were used as development tools.The developed system designed in this thesis together with experimental results proved that the system could be implemented successfully. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Solving robot path planning problem using Ant Colony Optimisation (ACO) approach / Nordin Abu Bakar and Rosnawati Abdul Kudus by Abu Bakar, Nordin, Abdul Kudus, Rosnawati

    Published 2009
    “…Learning is a complex cognitive process; thus, the algorithms that can simulate learning are also complex. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    An Intelligent Voltage Controller for a PV Inverter System Using Simulated Annealing Algorithm-Based PI Tuning Approach by Najeeb, Mushtaq, Muhamad, Mansor, Ramdan, Razali, Hamdan, Daniyal, Ali, Mahmood

    Published 2017
    “…This study associates an intelligent voltage controller based PI approach for PV electrical inverter by employing a meta-heuristic optimization algorithmic called a Simulated Annealing (SA) algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    A Collision Detection Algorithm For Virtual Robot-Centered Flexible Manufacturing Cell by Arshad, Haslina

    Published 2008
    “…This thesis presents a collision detection algorithm for accurate simulation of a virtual flexible manufacturing cell. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18

    Implementation of laser simulator in robot path determination by Zenas, Chung Han Yuan

    Published 2016
    “…In addition, one of the classical path planning approach which is A* algorithm will be used to compare the result generated by laser simulator. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  19. 19

    Network game (Literati) / Chung Mei Kuen by Chung, Mei Kuen

    Published 2003
    “…The possible applications of multimedia-networked system are endless, as the demand to support interactive communication among groups of users has increased significantly. …”
    Get full text
    Get full text
    Thesis
  20. 20

    SANAsms: Secure short messaging system for secure GSM mobile communication by Anuar, N.B., Azlan, I.M., Wahid, A.W.A., Zakaria, O.

    Published 2008
    “…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
    Get full text
    Get full text
    Conference or Workshop Item