Search Results - (( processes verification means algorithm ) OR ( java application interface algorithm ))
Search alternatives:
- processes verification »
- verification means »
- java application »
- means algorithm »
-
1
Real-time algorithmic music composition application.
Published 2022“…In addition, the system also utilises JavaFx and jFugue for its graphical user interface and music programming respectively. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
2
Application-Programming Interface (API) for Song Recognition Systems
Published 2024“…In addition the implementation is done by algorithm using Java’s programming language, executed through an application developed in the Android operating system. …”
Article -
3
Visdom: Smart guide robot for visually impaired people
Published 2025“…The system architecture integrates ROS 2 on a Raspberry Pi, with TCP/IP connectivity enabling remote operation. An Android mobile application, developed using Java and the java.net.Socket library, provides an intuitive and accessible user interface for seamless interaction with the robot. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
4
Development Of Machine Learning User Interface For Pump Diagnostics
Published 2022Get full text
Get full text
Monograph -
5
Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework
Published 2004“…A design proposal was outlined to provide an adaptive client/server approach to stream audio contents using Real-Time Transport Protocol (RTP) involving architecture based on the Java Media Framework (JMF) Application Programmable Interfaces (API).RTP protocol is the Internet-standard protocol for the transport of real-time data, including audio and video and can be implemented by using Java Media Framework (JMF). …”
Get full text
Get full text
Thesis -
6
Non-fiducial based electrocardiogram biometrics with kernel methods
Published 2017“…At classification level, Gaussian multi-class Support Vector Machine (SVM) with the One-Against-All (OAA) approach is proposed to evaluate verification performance rates of the feature extraction algorithms. …”
Get full text
Get full text
Thesis -
7
Movie recommendation system / Najwa Syamimie Hasnu
Published 2020Get full text
Get full text
Thesis -
8
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…The concept of ABS algorithm was firstly studied, including the definition, historical background, and a brief comparison was made between the ABS algorithm with other types of algorithm. …”
Get full text
Get full text
Undergraduates Project Papers -
9
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…The application is designed to satisfy the user friendly interfaces and intent to be used by the end user without having the advanced knowledge in mobile security. …”
Get full text
Get full text
Conference or Workshop Item -
10
Design Of Robot Motion Planning Algorithm For Wall Following Robot
Published 2006Get full text
Get full text
Monograph -
11
-
12
A Novel Approach Of Groebner Bases Computation For Safety Analysis Of Distributed Discrete Controllers
Published 2019“…At the end of this research, a complete tool of model checking method based on Groebner bases algorithm for safety verification will be produced. …”
Get full text
Get full text
Get full text
Technical Report -
13
Numerical simulation and experimental verification on distortions induced by wire-arc additive manufacturing components and costing analysis / Keval Priapratama Prajadhiana
Published 2024“…This thesis focuses on the substrate and part distortion induced by wire arc additive manufacturing (WAAM) which is predicted by means of numerical computation followed by experimental verification. …”
Get full text
Get full text
Thesis -
14
-
15
A framework of enhanced authentication for PDF textual documents using Zigzag-LSB embedding algorithm
Published 2024“…The security level for documents is necessary since a lot of formal procedures and processes nowadays need digital documents as proof or process verification, such as internet banking receipts, official letters of appointment, academic transcripts and certificates, scanned documents, and commercial documents for online marketing. …”
Get full text
Get full text
Thesis -
16
Web-based expert system for material selection of natural fiber- reinforced polymer composites
Published 2015“…As Java is platform independent and easy to be deployed in web based application and accessible through the World Wide Web (www), this expert system can be one stop application for materials selection.…”
Get full text
Get full text
Thesis -
17
Artificial neural network model for predicting windstorm intensity and the potential damages / Mohd Fatruz Bachok
Published 2019“…In addition, the mean square error (MSE) values for ANN model algorithms (pattern recognition tool) for 5 prediction processes are low from 0.00 to 0.0286 and errors from 0.00 to 0.0309. …”
Get full text
Get full text
Thesis -
18
Discretized Markov Chain in Damage Assessment Using Rainflow Cycle with Effects of Mean Stress On An Automobile Crankshaft
Published 2016“…We studied the effect of mean stress correction factor using the Rainflow counting technique to assess the fatigue damage of an automobile crankshaft under service loading by considering the stochastic process of the Markov chain. …”
Get full text
Get full text
Get full text
Article -
19
-
20
Hand, Foot and Mouth Disease (HFMD)'s Hotspot Identification using Bipartite Network Model
Published 2020“…The location node ranked based on the vector density of the disease. Verification analysis with a root mean square error (RMSE) value of 0.000564 and 0.000812 for location and human nodes respectively, which is much lower than threshold value of 0.05. …”
Get full text
Get full text
Final Year Project Report / IMRAD
