Search Results - (( using function ((based algorithm) OR (max algorithm)) ) OR ( java application based algorithm ))
Search alternatives:
- application based »
- java application »
- using function »
- max algorithm »
-
1
Real-time algorithmic music composition application.
Published 2022“…This project is about the study of evolutionary music, and focuses on the development of an algorithmic music composer using the Java programming language. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
2
A Toolkit for Simulation of Desktop Grid Environment
Published 2014“…The selected methodology for the application development is based on prototyping methodology. …”
Get full text
Get full text
Final Year Project -
3
Fair uplink bandwidth allocation and latency guarantee for mobile WiMAX using fuzzy adaptive deficit round robin
Published 2014“…In this paper, an efficient bandwidth allocation algorithm for the uplink traffic in mobile WiMAX is proposed. …”
Get full text
Get full text
Get full text
Article -
4
Statistical data preprocessing methods in distance functions to enhance k-means clustering algorithm
Published 2018“…The suggested approaches are called new approach to min-max (NAMM) and decimal scaling (NADS). The Hybrid mean algorithms which are based on spherical clusters is also proposed to remedy the most significant limitation of the K-Means and K-Midranges algorithms. …”
Get full text
Get full text
Get full text
Thesis -
5
Movie recommendation system / Najwa Syamimie Hasnu
Published 2020Get full text
Get full text
Thesis -
6
Songs Search Using Human Humming Voice
Published 2007“…Java programming language is used to build the system. The system has the functionality of humming voice recording and algorithms comparing both humming voice and song files in the system to fmd the right song. …”
Get full text
Get full text
Final Year Project -
7
Effective downlink resource management for wimax networks
Published 2018“…Our EDRM framework involves three functions: Class-Based Scheduling (CBS) algorithm, Dynamic Bandwidth Allocation (DBA) scheme and Link Session Management (LSM) policy. …”
Get full text
Get full text
Thesis -
8
Designing and Developing an Intelligent Congkak
Published 2011“…Therefore the project want to try to rectify this issue by trying to develop an Intelligent Congkak System that also implemented NN and try answer research question such as this: “What is the best Congkak evaluation function for training NN for game playing?” and “Can Min-Max algorithm (MM) be speeded up by using NN as a forward-pruning method?”. …”
Get full text
Get full text
Get full text
Thesis -
9
MBIST implementation and evaluation in FPGA based on low-complexity March algorithms
Published 2024“…March algorithms are widely used in Memory Built-In Self-Test (MBIST) on-chip memory testing, providing linear test complexities that reduce the test time and cost. …”
Get full text
Get full text
Get full text
Article -
10
Evolutionary Music; Composing Beats and Chords Progression
Published 2020“…This project focuses on delivering a JAVA application named “Evoluthm” with mainly the functions of generating chords progressions and beats. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
11
Web-based RIG performance reporting system using interactive visualization techniques / Amir Hambaly Nasaruddin
Published 2019“…For the user to analyze the result, the system provides visual analytics technique which can educate the user on analyzing the result which is drill down and sorting function to educate users. The result of this project is all algorithm for visualizing data is functioning and the output produced from the system is correct and effective. …”
Get full text
Get full text
Thesis -
12
Metaheuristic optimization techniques for localization in outdoor wireless sensor networks: a comprehensive review
Published 2025“…The primary objective of this paper isto review localization algorithms based on metaheuristic optimization techniques to improve localization accuracy. …”
Get full text
Get full text
Get full text
Get full text
Article -
13
RSS-based indoor localization system with single base station
Published 2021“…The paper proposes an Indoor Localization System (ILS) which uses only one fixed Base Station (BS) with simple non-reconfigurable antennas. …”
Get full text
Get full text
Get full text
Article -
14
Ant colony optimization in dynamic environments
Published 2010“…In order to achieve this objective, six ant algorithms namely Ant System (AS), Ant Colony System (ACS), Best-Worst Ant System (BWAS), Elitist Ant System (EAS), Max-Min Ant System (MMAS) and Rank-Based Ant System (RBAS) were implemented to solve a dynamic optimization problem in the form of the dynamic Traveling Salesman Problem (TSP). …”
Get full text
Get full text
Get full text
Thesis -
15
Adaptive RS-group scheduling for WiMAX multihop relay
Published 2010“…This paper proposes mesh topology for IEEE 802.16j using adaptive RS group scheduling. The proposed scheduling algorithm introduces new signalling to support functions such as soft and hard horizontal-RS neighbour scanning, bandwidth request, forwarding of PDUs and connection management. …”
Get full text
Get full text
Get full text
Proceeding Paper -
16
Maximum 2-satisfiability in radial basis function neural network
Published 2020“…This paper presents a new paradigm in using MAX2SAT by implementing in Radial Basis Function Neural Network (RBFNN). …”
Get full text
Get full text
Get full text
Article -
17
A New Technique To Design Coating Structure For Energy Saving Glass Using The Genetic Algorithm
Published 2017“…This research proposed a modified regular shape which is based on the best selected regular shape, modified using genetic algorithm on the central processing unit (CPU). …”
Get full text
Get full text
Get full text
Get full text
Thesis -
18
Tacit knowledge for business intelligence framework using cognitive-based approach
Published 2022“…This work presents a systematic approach for capturing tacit knowledge to be used in a business intelligence framework. The approach is based on the theory of systematic functional linguistics, developed into interview protocols to be asked to tacit knowledge owners. …”
Get full text
Get full text
Thesis -
19
Mitigation of shoulder-surfing attack on picture-based passwords using falsifying authentication methods / Por Lip Yee
Published 2012“…Two falsifying authentication methods using: (i) penup event and neighbouring connectivity manipulation; and (ii) partial password selection and metaheuristic randomisation algorithm methods, were proposed. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis -
20
Network monopoly / Tan Kean Yeap
Published 2002“…The category of networking could serves to be a small foundation from which to base the future scenario of other reliable multicast and real-time web based gaming system.…”
Get full text
Get full text
Thesis
