Search Results - (( using codification process algorithm ) OR ( java a combination algorithm ))
Search alternatives:
- combination algorithm »
- codification process »
- using codification »
- process algorithm »
- a combination »
- java a »
-
1
Application of genetic algorithm and JFugue in an evolutionary music generator
Published 2025“…This project explores the application of Genetic Algorithms (GA) with JFugue, which is a Java-based music programming library to develop an Evolutionary Music Generator. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
2
A Toolkit for Simulation of Desktop Grid Environment
Published 2014“…In this type of environment it is nearly impossible to prove the effectiveness of a scheduling algorithm. Hence the main objective of this study is to develop a desktop grid simulator toolkit for measuring and modeling scheduler algorithm performance. …”
Get full text
Get full text
Final Year Project -
3
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
4
Automatic Number Plate Recognition on android platform: With some Java code excerpts
Published 2016“…The main challenges of implementing ANPR algorithm on mobile phone are how to produce a higher coding efficiency, lower computational complexity, and higher scalability. …”
Get full text
Get full text
Get full text
Book -
5
Teaching and learning via chatbots with immersive and machine learning capabilities
Published 2019“…These chatbots acquired its intelligence through a hybrid approach that combines pattern-matching technique and machine learning algorithm in order to formulate its responses. …”
Get full text
Get full text
Conference or Workshop Item -
6
An Effective Fast Searching Algorithm for Internet Crawling Usage
Published 2016“…The search algorithm is a crucial part in any internet applications. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
7
Design of Improved Stream Cipher Algorithms for GSM Communication
Published 2024thesis::master thesis -
8
A random search based effective algorithm for pairwise test data generation
Published 2011“…Java program has been used to test the performance of the algorithm. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
9
Application-Programming Interface (API) for Song Recognition Systems
Published 2024“…The main contribution of this paper is the framework of Application Programming Interface (API) to be integrated on a smartphone app. The integration with algorithm that generates fingerprints from the method ST-PSD with several parameter configurations (Windows size, threshold, and sub-score linear combination coeffcient). …”
Article -
10
EasyA: Easy and effective way to generate pairwise test data
Published 2013“…Java program has been used to test the performance of the algorithm. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
11
Hybrid genetic algorithm for improving fault localization
Published 2018“…Genetic algorithm (GA) is well known in finding an optimal solution to a problem while local search is capable of removing duplication. …”
Get full text
Get full text
Get full text
Article -
12
Visdom: Smart guide robot for visually impaired people
Published 2025“…The app incorporates TalkBack accessibility support, enabling visually impaired users to navigate the interface using screen reader feedback. Once a destination is selected, the robot guides the user using a combination of voice prompts (e.g., "Heading to kitchen", "Be careful to your left") and physical feedback through a mounted guiding stick. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
13
Priority and dynamic quantum time algorithms for central processing unit scheduling
Published 2018“…Round Robin algorithm arrange and choose all elements in a group equally in time. …”
Get full text
Get full text
Thesis -
14
Splicing system and their variants with fuzzy algebraic sum / Mohd Pawiro Santono Othman
Published 2023“…This research discusses the concept of biological systems in Deoxyribonucleic Acid (DNA) which involves formal language theory namely splicing system. In DNA computing, a splicing system combines theoretical computer science and applied discrete mathematics. …”
Get full text
Get full text
Thesis -
15
The implications for ahybrid detection technique against malicious sqlattacks on web applications
Published 2025“…The methodology is based on JavaScript and PHP languages for developing a new technique called DetectCombined capable of filtering queries using parameterized queries to protect against SQL injection which is a safe method. …”
Get full text
Get full text
Get full text
Article -
16
Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography
Published 2009“…The strength of the information hiding science is due to the non-existence of standard algorithms to be used in hiding secret messages. Also there is randomness in hiding methods such as combining several media (covers) with different methods to pass a secret message. …”
Get full text
Get full text
Get full text
Article -
17
A cluster-based hybrid replica control protocol for high availability in data grid
Published 2019“…A clustering algorithm has been proposed to group the large nodes into clusters and organize these clusters into a tree structure. …”
Get full text
Get full text
Thesis -
18
A multi-filter feature selection in detecting distributed denial-of-service attack
Published 2019“…In addition, the proposed M2FS method is developed through WEKA API with Java Programming language using the IDE of Eclipse Java. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
19
Digital Quran With Storage Optimization Through Duplication Handling And Compressed Sparse Matrix Method
Published 2024thesis::doctoral thesis -
20
Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC
Published 2021“…This combination provides a secure key management mechanism and data hiding to provide strong encryption and decryption standards. …”
Get full text
Get full text
Thesis
