Search Results - (( program new ((method algorithm) OR (path algorithm)) ) OR ( java application using algorithm ))

Refine Results
  1. 1

    Application of genetic algorithm and JFugue in an evolutionary music generator by Tang, Jia Rou

    Published 2025
    “…This project explores the application of Genetic Algorithms (GA) with JFugue, which is a Java-based music programming library to develop an Evolutionary Music Generator. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  2. 2

    Optimization Of Two-Dimensional Dual Beam Scanning System Using Genetic Algorithms by Koh, Johnny Siaw Paw

    Published 2008
    “…This thesis presents a new approach to optimize the performance of a dual beam optical scanning system in terms of its scanning combinations and speed, using Genetic Algorithm (GA). …”
    Get full text
    Get full text
    Thesis
  3. 3

    Design, development and performance optimization of a new artificial intelligent controlled multiple-beam optical scanning module by Koh, Johnny Siaw Paw, Aris, Ishak, Ramachandaramurthy, Vigna Kumaran, Bashi, Sinan Mahmod, Marhaban, Mohammad Hamiruce

    Published 2006
    “…This research presents a new approach to optimise the performance of a multiple-beam optical scanning system in terms of its marking combinations and speed, using Genetic Algorithm (GA). …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Development of real-time navigation system by using pure pursuit guidance for unmanned surface vehicle by Putri Nur Farhanah, Mohd Shamsuddin

    Published 2024
    “…Therefore, a Pure Pursuit algorithm will be developed to assist the USV in tracking the target's position, ensuring that the vehicle will follow the new path information, and enhancing the real-time performance of the USV as it tracks the target's current position based on the output commands. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Design, development and performance optimization of a new artificial intelligent controlled multiple-beam optical scanning module by Koh J.S.P., Aris I.B., Ramachandaramurthy V.K., Bashi S.M., Marhaban M.H.

    Published 2023
    “…This research presents a new approach to optimise the performance of a multiple-beam optical scanning system in terms of its marking combinations and speed, using Genetic Algorithm (GA). …”
    Article
  6. 6

    Design, development and performance optimization of a new artificial intelligent controlled multiple-beam optical scanning module by Koh J.S.P., Aris I.B., Ramachandaramurthy V.K., Bashi S.M., Marhaban M.H.

    Published 2023
    “…This research presents a new approach to optimise the performance of a multiple-beam optical scanning system in terms of its marking combinations and speed, using Genetic Algorithm (GA). …”
    Article
  7. 7

    NN with DTW-FF Coefficients and Pitch Feature for Speaker Recognition by Sudirman, Rubita, Salleh, Sh-Hussain, Salleh, Shaharuddin

    Published 2006
    “…This paper proposes a new method to extract speech features in a warping path using dynamic programming (DP). …”
    Get full text
    Get full text
    Article
  8. 8

    Mathematical simulation for 3-dimensional temperature visualization on open source-based grid computing platform by Alias, Norma, Satam, Noriza, Abd. Ghaffar, Zarith Safiza, Darwis, Roziha, Hamzah, Norhafiza, Islam, Md. Rajibul

    Published 2009
    “…The development of this architecture is based on several programming language as it involves algorithm implementation on C, parallelization using Parallel Virtual Machine (PVM) and Java for web services development. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    Optimum Time-Cost Trade-Off Strategies on Critical Path Method for Project Management by Khalaf, Wakas S.

    Published 2010
    “…Approach of Crashing Critical Activities (CCA) was originally developed along with the Critical Path Method (CPM) for planning and controlling large scale projects in the late 50s. …”
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…The experiment contains two phases; first phase was conducted against java applications that do not use any protection to determine the ability of reversing tools to read the compiled code. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Development of a Mobile Robot Local Navigation System Based on Fuzzy-Logic Control and Actual Virtual Target Switching by Esmaeili Motlagh, Omid Reza

    Published 2006
    “…While the fuzzy logic body of the algorithm performs the main tasks of obstacle avoidance, target seeking, and speed adjustment, an actual-virtual target switch strategy integrated with the fuzzy logic algorithm enables the robot to show wall following behavior when needed. …”
    Get full text
    Get full text
    Thesis
  13. 13

    New reflector shaping methods for dual-reflector antenna by Quzwain, Kamelia, Yamada, Yoshihide, Kamardin, Kamilia, Abd Rahman, Nurul Huda, Ismail, Alyani

    Published 2022
    “…The accuracy of MATLAB program is ensured from the obtained ray path results, aperture distribution and radiation pattern. …”
    Get full text
    Get full text
    Article
  14. 14

    Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system by Beg, Abul Hashem

    Published 2011
    “…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
    Get full text
    Get full text
    Thesis
  15. 15

    A Novel Integrating Between Tool Path Optimization Using An ACO Algorithm And Interpreter For Open Architecture CNC System by Yusof, Yusri, Latif, Kamran, Hatem, Noor, A. Kadir, Aini Zuhra, Mohammed, M.A

    Published 2021
    “…In the context of automatic NC program production, the optimization of the cutting tool’s travel path could be achieved by integrating the ACO algorithm and the Open Architecture Control (OAC) into commercial CAD/CAM. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Development of robust control scheme for wheeled mobile robot in restricted environment by Muhammad Sawal, A Radzak

    Published 2021
    “…A simulation study of WMR control in pre-planned paths in two environments namely, zigzag and highly curved terrains, has been conducted to verify the proposed algorithm and compare it with other existed algorithms. …”
    Get full text
    Get full text
    Thesis
  17. 17

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  18. 18
  19. 19
  20. 20

    A Feasible Architecture Of Real-Time Collision Avoidance And Path Planning For Semi-Autonomous Unmanned Ground Vehicle (Ugv) by Subramaniam, Purawin

    Published 2018
    “…Therefore, APM is used for navigation before and after approaching obstacles. Path planning algorithm in this project provides the best path to avoid the obstacle and create temporary new waypoints within split seconds. …”
    Get full text
    Get full text
    Monograph