Search Results - (( software version method algorithm ) OR ( java application model algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3
  4. 4

    Real-time algorithmic music composition application. by Yap, Alisa Yi Hui

    Published 2022
    “…This project is about the study of evolutionary music, and focuses on the development of an algorithmic music composer using the Java programming language. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  5. 5

    Improving collection of data type evidence and the integrity of evidence collected using SHA-256 hashing algorithm for web browsers by Asmawi, Aziah, Md Yasin, Sharifah, Mohd Shah, Nur Hazierah

    Published 2024
    “…The existing tools for evidence collection primarily rely on SHA-1 hashing and using older version windows and software toolkits version. Therefore, this study proposes the addition in toolkits implementation, the latest software tools version and the latest solution, an improvement proof-of-concept utilizes SHA-256 hashing algorithm to improve the collection of evidence and enhance integrity. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6
  7. 7

    Security mechanism for wireless Mobile Ad Hoc Networks (MANET) by Abdul Rahman Sidek, Diana

    Published 2006
    “…This report provides an overview of wireless ad hoc networks, wireless threats, cryptography background and the security algorithms for this encryption method. The One Time Pad algorithm and Caesar Cipher algorithms are implemented using LabVIEW software. …”
    Get full text
    Get full text
    Student Project
  8. 8
  9. 9
  10. 10

    Application of genetic algorithm for optimal voltage control of the power system / Mohd Supian Yahya by Yahya, Mohd Supian

    Published 1998
    “…All simulation was done on the MATLAB software package version 4.2c. 1.…”
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12

    A Toolkit for Simulation of Desktop Grid Environment by FOROUSHAN, PAYAM CHINI

    Published 2014
    “…In this type of environment it is nearly impossible to prove the effectiveness of a scheduling algorithm. Hence the main objective of this study is to develop a desktop grid simulator toolkit for measuring and modeling scheduler algorithm performance. …”
    Get full text
    Get full text
    Final Year Project
  13. 13

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…The objective of this study is to enhance the confidentiality and security of the image steganography application by combining cryptography algorithm. In this proposed model, the RSA algorithm is used to encrypt a secret message into an unreadable ciphertext before hiding it in the image. …”
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14

    A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment by Ruzita, Ahmad

    Published 2013
    “…This thesis describes original research in the field of software quality model by presenting a Feature Ranking Algorithm (FRA) for Pragmatic Quality Factor (PQF) model. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    An enhanced mobile internet protocol version 6 (IPv6) with multicast function and hierarchical design. by Khatun, Sabira

    Published 2006
    “…Mobile IPv6 mechanism requires some handover algorithm when it changes its point of attachment in the Internet.An enhanced micro mobility handover algorithm is developed on top of mobile IPv6. …”
    Get full text
    Patent
  16. 16

    Seven cases unstructured triangulation technique for simplified version of conceptual model of ethylene furnace for radiative heat transfer approximation by Hasan Basari, Abd Samad, Abal Abas, Zuraida, Salleh, Shaharuddin

    Published 2012
    “…The quality of the mesh is determined based on a measurement in GAMBIT software. 7CUTT provides the framework for the heat to be approximated using the discrete ordinate method, which is a variant of the finite volume method. …”
    Get full text
    Get full text
    Article
  17. 17
  18. 18

    Network game (Literati) / Chung Mei Kuen by Chung, Mei Kuen

    Published 2003
    “…Therefore, efficient and robust servers that process separate client connections in separate threads are needed. Java applet is a well-known and widely used example of mobile code (a variation on the traditional client-server model). …”
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20

    A modified n-th section line search in conjugate gradient methods for solving unconstrained optimization / Muhammad Imza Fakhri Jinudin by Jinudin, Muhammad Imza Fakhri

    Published 2018
    “…Other than that, the modified version of n-th section line search method has less amount of CPU time allocated to execute CG's algorithm when compared to the original version of n-th section line search method. …”
    Get full text
    Get full text
    Thesis