Search Results - (( program walking method algorithm ) OR ( java application a algorithm ))

Refine Results
  1. 1
  2. 2

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…The key is the trigger mechanism to the algorithm. Until the advent of the Internet, encryption was rarely used by the public, but was largely a military tool. …”
    Get full text
    Get full text
    Final Year Project
  3. 3

    Framework for pedestrian walking behaviour recognition to minimize road accident by Hashim Kareem, Zahraa

    Published 2021
    “…Fourthly, four standard vectors for pedestrian walking behaviour are developed. Fifthly, the performance of the proposed classification methods is validated and evaluated against multiple scenarios and features. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    Framework for pedestrian walking behaviour recognition to minimize road accident by Hashim Kareem, Zahraa

    Published 2021
    “…Fourthly, four standard vectors for pedestrian walking behaviour are developed. Fifthly, the performance of the proposed classification methods is validated and evaluated against multiple scenarios and features. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6

    3D solid robot animation design based on ADAMS by Baojian Yang, Yongning Deng, Xia Yue, Tze, Kenneth Kin Teo

    Published 2023
    “…The experimental study found that the three-step planning method for biped robotic static walking planning is feasible and can reach 98%, and can meet the pre-planning requirements.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  7. 7
  8. 8

    Real-Time Video Processing Using Native Programming on Android Platform by Saipullah, Khairul Muzzammil

    Published 2012
    “…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9
  10. 10

    Application of genetic algorithm and JFugue in an evolutionary music generator by Tang, Jia Rou

    Published 2025
    “…This project explores the application of Genetic Algorithms (GA) with JFugue, which is a Java-based music programming library to develop an Evolutionary Music Generator. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  11. 11

    Performance evaluation of real-time multiprocessor scheduling algorithms by Alhussian, H., Zakaria, N., Abdulkadir, S.J., Fageeri, S.O.

    Published 2016
    “…We hyave used the CPU profiler of Oracle JavaTM VisualVM to monitor the execution of LRE-TL as well as USG algorithms. …”
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12

    Real-time algorithmic music composition application. by Yap, Alisa Yi Hui

    Published 2022
    “…This project is about the study of evolutionary music, and focuses on the development of an algorithmic music composer using the Java programming language. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  13. 13

    Route Optimization System by Zulkifli, Abdul Hayy

    Published 2005
    “…This algorithm is an exact algorithm that is specifically for finding the shortest route in a network. …”
    Get full text
    Get full text
    Final Year Project
  14. 14
  15. 15

    Automated pavement imaging program (APIP) for pavement cracks classification and quantification – a photogrammetric approach by Mustaffar, Mushairry, Puan, O. C., Ling, Tung Chai

    Published 2008
    “…The digital image processing program enables longitudinal, transverse, and alligator cracking to be classified. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    A Toolkit for Simulation of Desktop Grid Environment by FOROUSHAN, PAYAM CHINI

    Published 2014
    “…In this type of environment it is nearly impossible to prove the effectiveness of a scheduling algorithm. Hence the main objective of this study is to develop a desktop grid simulator toolkit for measuring and modeling scheduler algorithm performance. …”
    Get full text
    Get full text
    Final Year Project
  17. 17

    Evaluation of cracks and disintegrations using close-range digital photogrammetry and image processing technique by Ling, Tung Chai

    Published 2005
    “…Results obtained by this technique are compared with the Jabatan Kerja Raya manual using conventional method to check accuracy. The algorithms developed in this study are capable of identifying type of cracking and its severity level at the accuracy about 90%. …”
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19
  20. 20

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item