Search Results - (( variable effective implementation algorithm ) OR ( java application using algorithm ))
Search alternatives:
- implementation algorithm »
- variable effective »
- java application »
- using algorithm »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
-
3
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
4
Real-Time Video Processing Using Native Programming on Android Platform
Published 2012“…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
6
Real-time algorithmic music composition application.
Published 2022“…This project is about the study of evolutionary music, and focuses on the development of an algorithmic music composer using the Java programming language. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
7
Performance evaluation of real-time multiprocessor scheduling algorithms
Published 2016“…We hyave used the CPU profiler of Oracle JavaTM VisualVM to monitor the execution of LRE-TL as well as USG algorithms. …”
Get full text
Get full text
Conference or Workshop Item -
8
Optimization of blood vessel detection in retina images using multithreading and native code for portable devices
Published 2013Get full text
Get full text
Conference or Workshop Item -
9
Application of genetic algorithm and JFugue in an evolutionary music generator
Published 2025“…This project explores the application of Genetic Algorithms (GA) with JFugue, which is a Java-based music programming library to develop an Evolutionary Music Generator. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
10
-
11
Route Optimization System
Published 2005“…The method used to develop this project is Rapid Application Development (RAD). …”
Get full text
Get full text
Final Year Project -
12
Security analysis of blowfish algorithm
Published 2013“…C++ is used in the implementation of the blowfish algorithm; MATLAB programming (Mathworks, R., 2012a) is used in the implementation of avalanche effect and correlation coefficient.…”
Get full text
Get full text
Conference or Workshop Item -
13
Application of Multi-objective Genetic Algorithm (MOGA) for design optimization of valve timing at various engine speeds
Published 2011“…The primary concern is to acquire the clear picture of the implementation of Multi-Objective Genetic Algorithm and the essential of variable valve timing effects on the engine performances in various engine speeds. …”
Get full text
Get full text
Get full text
Article -
14
IMPLEMENTATION OF BEHAVIOUR BASED NAVIGATION IN A PHYSICALLY CONFINED SITE
Published 2017“…However, specific algorithm may only be effective for a specific environment. …”
Get full text
Get full text
Final Year Project -
15
Variable Global Optimization min-sum (VGOMS) algorithm of decode-and forward-protocol for the relay node in the cooperative channel
Published 2020“…A low complexity min-sum (MS) based algorithm called the Variable Global Optimization min-sum (VGOMS) algorithm has been developed to minimise the error corrective performance. …”
Get full text
Get full text
Get full text
Article -
16
Design optimization of valve timing at various engine speeds using Multi-Objective Genetic Algorithm (MOGA)
Published 2008“…The primary concern is to acquire the clear picture of the implementation of Multi-Objective Genetic Algorithm and the essential of variable valve timing effects on the engine performances in various engine speeds. …”
Get full text
Get full text
Proceeding Paper -
17
Secure Image Steganography Using Encryption Algorithm
Published 2016“…Diffie-Hellman algorithm is used to determine the pixel on an image that will be used to store the message. …”
Get full text
Get full text
Conference or Workshop Item -
18
Automatic control of flotation process using computer vision
Published 2015“…In addition, several algorithms were implemented to measure the other important image variables such as froth velocity,froth color and bubble collapse rate. …”
Get full text
Get full text
Thesis -
19
Security analysis of blowfish algorithm
Published 2013“…The results obtained from the analysis of correlation coefficient showed that Blowfish algorithm gives a good nonlinear relation between plaintext and ciphertext while the results of avalanche effect indicate that the algorithm presents good avalanche effect from the second round.C++ is used in the implementation of the blowfish algorithm; MATLAB programming (Mathworks, R., 2012a) is used in the implementation of avalanche effect and correlation coefficient.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
20
A Toolkit for Simulation of Desktop Grid Environment
Published 2014“…The prototypes will be developed using JAVA language united with a MySQL database. …”
Get full text
Get full text
Final Year Project
