Search Results - (( programming probability function algorithm ) OR ( java application service algorithm ))
Search alternatives:
- programming probability »
- probability function »
- application service »
- function algorithm »
- service algorithm »
- java application »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
2
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
3
-
4
Exam hall allocation using genetic algorithm / Norisyani Binti Fauzai
Published 2021Get full text
Get full text
Thesis -
5
-
6
Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework
Published 2004“…A design proposal was outlined to provide an adaptive client/server approach to stream audio contents using Real-Time Transport Protocol (RTP) involving architecture based on the Java Media Framework (JMF) Application Programmable Interfaces (API).RTP protocol is the Internet-standard protocol for the transport of real-time data, including audio and video and can be implemented by using Java Media Framework (JMF). …”
Get full text
Get full text
Thesis -
7
The Determination of Pile Capacity Using Artificial Neural-net: An Optimization Approach
Published 2001“…Using the developed algorithm, the safety measures involved are such as reliability index and the probability of failure; instead of only factor of safety if conventional deterministic approach is used. …”
Get full text
Get full text
Article -
8
Modified ant colony optimization algorithms for deterministic and stochastic inventory routing problems / Lily Wong
Published 2018“…The demands in SIRP are modeled by some probability functions and due to the stochastic nature of customer demands, the service levels constraint where it limits the stock out probability at each customer and the probability of overfilling the stock of each customer is introduced in this study. …”
Get full text
Get full text
Get full text
Thesis -
9
-
10
The child tracker using location awareness / Muhammad Idham Amdan
Published 2017Get full text
Get full text
Thesis -
11
Enhancing Power System Resilience Through Evolutionary Programming for High Impact Low Probability Events
Published 2025“…This paper presents enhancing power system resilience through evolutionary programming for high-impact low probability (HILP) events. …”
Conference paper -
12
Mathematical simulation for 3-dimensional temperature visualization on open source-based grid computing platform
Published 2009“…The development of this architecture is based on several programming language as it involves algorithm implementation on C, parallelization using Parallel Virtual Machine (PVM) and Java for web services development. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
13
-
14
Talkout : Protecting mental health application with a lightweight message encryption
Published 2022“…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
Get full text
Get full text
Get full text
Academic Exercise -
15
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…A GUI is created in a form of JAVA application to display data detected from tag. …”
Get full text
Get full text
Thesis -
16
Comparative analysis of web-based programs for single amino acid substitutions in proteins
Published 2022“…In recent years, developments in existing programs and the introduction of new prediction algorithms have transformed the state-of-the-art protein mutation analysis. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
17
-
18
Car recognition using Bayes Classifier / Nur Atiqah Mat Samadi
Published 2017Get full text
Get full text
Thesis -
19
Investigating The Performance Of Metaheuristics To Optimize The Revenue Of Semiconductor Supply Chain
Published 2022“…Below is the comparison of the fitness value among 20 metaheuristics algorithms run through Python programming.…”
Get full text
Get full text
Monograph -
20
Optimal assignments of versions to processors in fault-tolerant computer systems
Published 1988“…For voting system, k must be at least 2 and, in this case the objective function is non-linear. This implies that linear assignment algorithms cannot be used to obtain the optimal assignment. …”
Get full text
Get full text
Article
