Search Results - (( programming using window algorithm ) OR ( java application model algorithm ))
Search alternatives:
- application model »
- window algorithm »
- java application »
- model algorithm »
- using window »
-
1
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis -
2
-
3
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
4
Formulating and solving stochastic truck and trailer routing problems using meta-heuristic algorithms / Seyedmehdi Mirmohammadsadeghi
Published 2015“…Twenty one benchmark-instances have been modified for this case and solved by using the aforesaid algorithms. Afterward, the TTRPSD is extended by considering the time window constraints. …”
Get full text
Get full text
Get full text
Thesis -
5
Overview of metaheuristic: classification of population and trajectory
Published 2010Get full text
Get full text
Monograph -
6
Optimization of blood vessel detection in retina images using multithreading and native code for portable devices
Published 2013Get full text
Get full text
Conference or Workshop Item -
7
Mathematical models and optimization algorithms for low-carbon Location-Inventory-Routing Problem with uncertainty
Published 2024“…This thesis also aims to solve the low-carbon LIRP model with uncertainty factors such as carbon trading, customer demand, shortages, and soft time windows using advanced algorithms. Three LIRP models involving multiple distribution centers and periods are proposed. …”
Get full text
Get full text
Get full text
Thesis -
8
Real-time algorithmic music composition application.
Published 2022“…This project is about the study of evolutionary music, and focuses on the development of an algorithmic music composer using the Java programming language. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
9
Encryption Technology on Windows Workstation
Published 2004“…This study is done because current encryption method in Windows environment is quite weak (e.g.: Windows password) and easily breakable using program like LC4(@stake LC4, about). …”
Get full text
Get full text
Final Year Project -
10
Ciphercrypt-an Encryption System / Nor Hidayah Ngah
Published 2004“…This system is implemented on a Windows platform with Visual Basic as a programming language and 3-DES as a main encryption algorithm. …”
Get full text
Get full text
Thesis -
11
Agent-based extraction algorithm for computational problem solving
Published 2015“…The tool is used to evaluate the accuracy of the proposed extraction algorithm to extract the appropriate information which are needed. …”
Get full text
Get full text
Thesis -
12
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
13
-
14
Simulation and Visualization of TSP Using Ant Colony Optimization
Published 2023“…With Windows as the operating system and the C# programming language in Visual Studio 2019, the program complies with the Extreme Programming (XP) software development method. …”
Get full text
Get full text
Get full text
Article -
15
-
16
A Toolkit for Simulation of Desktop Grid Environment
Published 2014“…In this type of environment it is nearly impossible to prove the effectiveness of a scheduling algorithm. Hence the main objective of this study is to develop a desktop grid simulator toolkit for measuring and modeling scheduler algorithm performance. …”
Get full text
Get full text
Final Year Project -
17
Application-Programming Interface (API) for Song Recognition Systems
Published 2024“…In addition the implementation is done by algorithm using Java’s programming language, executed through an application developed in the Android operating system. …”
Article -
18
Secure Image Steganography Using Encryption Algorithm
Published 2016“…The objective of this study is to enhance the confidentiality and security of the image steganography application by combining cryptography algorithm. In this proposed model, the RSA algorithm is used to encrypt a secret message into an unreadable ciphertext before hiding it in the image. …”
Get full text
Get full text
Conference or Workshop Item -
19
Bi-objective mixed integer nonlinear programming model for low carbon location-inventory-routing problem with time windows and customer satisfaction
Published 2024“…This paper proposes a bi-objective mixed-integer nonlinear programming model with time window constraints that satisfies the normal distribution of stochastic customer demand. …”
Get full text
Get full text
Get full text
Article -
20
A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment
Published 2013“…This thesis describes original research in the field of software quality model by presenting a Feature Ranking Algorithm (FRA) for Pragmatic Quality Factor (PQF) model. …”
Get full text
Get full text
Get full text
Thesis
