Search Results - (( variable effective implementation algorithm ) OR ( java application need algorithm ))
Search alternatives:
- implementation algorithm »
- variable effective »
- java application »
- application need »
- need algorithm »
-
1
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
2
Real-Time Video Processing Using Native Programming on Android Platform
Published 2012“…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
3
Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework
Published 2004“…A design proposal was outlined to provide an adaptive client/server approach to stream audio contents using Real-Time Transport Protocol (RTP) involving architecture based on the Java Media Framework (JMF) Application Programmable Interfaces (API).RTP protocol is the Internet-standard protocol for the transport of real-time data, including audio and video and can be implemented by using Java Media Framework (JMF). …”
Get full text
Get full text
Thesis -
4
Parallel distributed genetic algorithm development based on microcontrollers framework
Published 2023Conference paper -
5
Security analysis of blowfish algorithm
Published 2013“…C++ is used in the implementation of the blowfish algorithm; MATLAB programming (Mathworks, R., 2012a) is used in the implementation of avalanche effect and correlation coefficient.…”
Get full text
Get full text
Conference or Workshop Item -
6
Network game (Literati) / Chung Mei Kuen
Published 2003“…Therefore, efficient and robust servers that process separate client connections in separate threads are needed. Java applet is a well-known and widely used example of mobile code (a variation on the traditional client-server model). …”
Get full text
Get full text
Thesis -
7
Application of Multi-objective Genetic Algorithm (MOGA) for design optimization of valve timing at various engine speeds
Published 2011“…The primary concern is to acquire the clear picture of the implementation of Multi-Objective Genetic Algorithm and the essential of variable valve timing effects on the engine performances in various engine speeds. …”
Get full text
Get full text
Get full text
Article -
8
IMPLEMENTATION OF BEHAVIOUR BASED NAVIGATION IN A PHYSICALLY CONFINED SITE
Published 2017“…However, specific algorithm may only be effective for a specific environment. …”
Get full text
Get full text
Final Year Project -
9
Variable Global Optimization min-sum (VGOMS) algorithm of decode-and forward-protocol for the relay node in the cooperative channel
Published 2020“…A low complexity min-sum (MS) based algorithm called the Variable Global Optimization min-sum (VGOMS) algorithm has been developed to minimise the error corrective performance. …”
Get full text
Get full text
Get full text
Article -
10
Design optimization of valve timing at various engine speeds using Multi-Objective Genetic Algorithm (MOGA)
Published 2008“…The primary concern is to acquire the clear picture of the implementation of Multi-Objective Genetic Algorithm and the essential of variable valve timing effects on the engine performances in various engine speeds. …”
Get full text
Get full text
Proceeding Paper -
11
Automatic control of flotation process using computer vision
Published 2015“…In addition, several algorithms were implemented to measure the other important image variables such as froth velocity,froth color and bubble collapse rate. …”
Get full text
Get full text
Thesis -
12
Security analysis of blowfish algorithm
Published 2013“…The results obtained from the analysis of correlation coefficient showed that Blowfish algorithm gives a good nonlinear relation between plaintext and ciphertext while the results of avalanche effect indicate that the algorithm presents good avalanche effect from the second round.C++ is used in the implementation of the blowfish algorithm; MATLAB programming (Mathworks, R., 2012a) is used in the implementation of avalanche effect and correlation coefficient.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
13
Variable Global Optimization min-sum (VGOMS) algorithm of decodeand-forward protocol for the relay node in the cooperative channel
Published 2019“…A low complexity min-sum (MS) based algorithm called the Variable Global Optimization min-sum (VGOMS) algorithm has been developed to minimise the error corrective performance. …”
Get full text
Get full text
Get full text
Article -
14
Automated time series forecasting
Published 2011Get full text
Get full text
Get full text
Monograph -
15
The Implementation of Genetic Algorithm in Path Optimization
Published 2005“…In this project, TSP will be used to model and easy visualize the path optimization problem and Genetic Algorithm (GA) was chosen to be implemented in resolving the problem. …”
Get full text
Get full text
Final Year Project -
16
Encrypted mobile messaging application using AES block cipher cryptography algorithm / Nur Rasyiqah Zulkifli
Published 2019“…The programming language that is used to write the program is Java Language that will run on android phones. As the result, this project was tested on the functionality of the mobile messaging application. …”
Get full text
Get full text
Student Project -
17
Design Of Robot Motion Planning Algorithm For Wall Following Robot
Published 2006Get full text
Get full text
Monograph -
18
Slight-Delay Shaped Variable Bit Rate (SD-SVBR) Technique for Video Transmission
Published 2011“…It is designed based on the Shaped VBR (SVBR) algorithm and was implemented in the Network Simulator 2 (ns-2). …”
Get full text
Get full text
Get full text
Thesis -
19
Minimizing power loss using modified artificial bee colony algorithm / Nur Azlin Ashiqin Mohd Amin ...[et al.]
Published 2021“…The results are compared with Firefly algorithm (FA) and Artificial Bee Colony (ABC) algorithm method to prove the effectiveness of the newest algorithm. …”
Get full text
Get full text
Get full text
Article -
20
Text messaging encryption system
Published 2012Get full text
Get full text
Undergraduates Project Papers
