Search Results - (( software migration model algorithm ) OR ( java application using algorithm ))

Refine Results
  1. 1

    Experimental Model for Teaching Software Testing by Kamal Z., Zamli, Hasneeza, L. Zakaria

    Published 2015
    “…In this paper, we propose the concept of teaching software testing with an experimental model for pairwise testing; developed with Migrating Birds Optimization (MBO) algorithm called Experimental Model for Teaching Software Testing (EMTST). …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Clustering-based cloud migration strategies by Aslam, M., Rahim, L.B.A., Watada, J., Hashmani, M.

    Published 2018
    “…This helps to link the cloud migration strategies across the cloud service models (software as a service, platform as a service, and infrastructure as a service). …”
    Get full text
    Get full text
    Article
  3. 3

    Clustering-based cloud migration strategies by Aslam, M., Rahim, L.B.A., Watada, J., Hashmani, M.

    Published 2018
    “…This helps to link the cloud migration strategies across the cloud service models (software as a service, platform as a service, and infrastructure as a service). …”
    Get full text
    Get full text
    Article
  4. 4

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9

    Improving oil palm fresh fruit bunch grading system via software and hardware modifications by Shabdin, Muhammad Kashfi

    Published 2016
    “…This problem is due to the size of the image captured which is 1Gb per image. Therefore, the algorithm was migrated to a standalone software using LabVIEW. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Real-Time Video Processing Using Native Programming on Android Platform by Saipullah, Khairul Muzzammil

    Published 2012
    “…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11
  12. 12

    Energy and performance efficient resource allocation for cloud-based data centers by Akhter, Nasrin

    Published 2015
    “…In this study, we found that our proposed algorithms able to reduce energy consumption by 3% and 19% for host overload detection and VM selection algorithm respectively.…”
    Get full text
    Get full text
    Thesis
  13. 13

    Real-time algorithmic music composition application. by Yap, Alisa Yi Hui

    Published 2022
    “…This project is about the study of evolutionary music, and focuses on the development of an algorithmic music composer using the Java programming language. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  14. 14

    Performance evaluation of real-time multiprocessor scheduling algorithms by Alhussian, H., Zakaria, N., Abdulkadir, S.J., Fageeri, S.O.

    Published 2016
    “…We hyave used the CPU profiler of Oracle JavaTM VisualVM to monitor the execution of LRE-TL as well as USG algorithms. …”
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15
  16. 16

    Application of genetic algorithm and JFugue in an evolutionary music generator by Tang, Jia Rou

    Published 2025
    “…This project explores the application of Genetic Algorithms (GA) with JFugue, which is a Java-based music programming library to develop an Evolutionary Music Generator. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  17. 17

    Conceptual deployment models to secure cloud computing / Hajar Ziglari by Ziglari, Hajar

    Published 2012
    “…Ekatarina Yadova to see the effectiveness of the models. The next step will be about development and corresponding interfaces and design patterns for applications to fit the deployment models and working on security protocols and algorithms in the proposed models to have security support in the cryptography part.…”
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19

    Route Optimization System by Zulkifli, Abdul Hayy

    Published 2005
    “…The method used to develop this project is Rapid Application Development (RAD). …”
    Get full text
    Get full text
    Final Year Project
  20. 20

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…Diffie-Hellman algorithm is used to determine the pixel on an image that will be used to store the message. …”
    Get full text
    Get full text
    Conference or Workshop Item