Search Results - (( variable implementation best algorithm ) OR ( java application based algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    FPGA implementation of variable precision Euclid’s GCD algorithm by Al-Haija, Qasem Abu, Syed Ahmad Abdul Rahman, Sharifah Mumtazah, Alfarran, Islam

    Published 2017
    “…Methodology: In this paper, we implement a fast GCD coprocessor based on Euclid's method with variable precisions (32-bit to 1024-bit). …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3
  4. 4

    Application of genetic algorithm and JFugue in an evolutionary music generator by Tang, Jia Rou

    Published 2025
    “…This project explores the application of Genetic Algorithms (GA) with JFugue, which is a Java-based music programming library to develop an Evolutionary Music Generator. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  5. 5
  6. 6
  7. 7

    Real-Time Video Processing Using Native Programming on Android Platform by Saipullah, Khairul Muzzammil

    Published 2012
    “…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    A DC motor controller using PID algorithm implementation on PIC by Wan Robaah, W Ahmad

    Published 2008
    “…This project is about controlling the speed of DC servo motor by using Proportional-Integral-Derivative (PID) algorithm then implemented on Peripheral Interface Circuit (PIC) microcontroller. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  9. 9
  10. 10

    Real-time algorithmic music composition application. by Yap, Alisa Yi Hui

    Published 2022
    “…This project is about the study of evolutionary music, and focuses on the development of an algorithmic music composer using the Java programming language. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  11. 11

    Accelerating DNA sequence alignment based on smith waterman algorithm using recursive variable expansion / Muhamad Faiz Ismail by Ismail, Muhamad Faiz

    Published 2014
    “…It removes all the data dependences by expanding the variable with its dependence expression until the expression becomes only a function of known variables. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework by Asaad Aref, Ibrahim

    Published 2004
    “…A design proposal was outlined to provide an adaptive client/server approach to stream audio contents using Real-Time Transport Protocol (RTP) involving architecture based on the Java Media Framework (JMF) Application Programmable Interfaces (API).RTP protocol is the Internet-standard protocol for the transport of real-time data, including audio and video and can be implemented by using Java Media Framework (JMF). …”
    Get full text
    Get full text
    Thesis
  13. 13

    Determination of tree stem volume : A case study of Cinnamomum by Noraini Abdullah

    Published 2013
    “…It helps in the proper decision makings and implementation of policies. Hence, this research is designed such that the idea of determining the best models and solving their parameters that give the best estimates are conceptualized. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    A Toolkit for Simulation of Desktop Grid Environment by FOROUSHAN, PAYAM CHINI

    Published 2014
    “…The selected methodology for the application development is based on prototyping methodology. …”
    Get full text
    Get full text
    Final Year Project
  15. 15

    Optimization of Upstream Offshore Oilfield Production Planning under Uncertainty and Downstream Crude Oil Scheduling at Refinery Front-End by Tan Yin Keong, Tan Yin

    Published 2012
    “…The solution obtained from the LB–MILP model, i.e., the decision variables (binary variables), was used to obtain a feasible solution for model UB–NLP. …”
    Get full text
    Get full text
    Final Year Project
  16. 16

    Optimization of Upstream Offshore Oilfield Production Planning under Uncertainty and Downstream Crude Oil Scheduling at Refinery Front-End by Tan , Yin Keong

    Published 2009
    “…The solution obtained from the LB-MILP model, i.e., the decision variables (binary variables), was used to obtain a feasible solution for model UB-NLP. …”
    Get full text
    Get full text
    Final Year Project
  17. 17
  18. 18

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19

    Study of nature inspired computing (NIC) technique for optimal reactive power dispatch problems by Sulaiman, Mohd Herwan

    Published 2017
    “…ORPD problem is a nonlinear optimization problem that involving both equality constraints and inequality constraints. The proposed algorithms are tested on five different case studies which are IEEE 30-bus system with 13 control variables, IEEE 30-bus system with 19 control variables, IEEE 30-bus system with 25 control variables, IEEE 57-bus system with 25 control variables and IEEE 118-bus system with 77 control variables. …”
    Get full text
    Get full text
    Research Report
  20. 20

    An approach for cross-site scripting detection and removal based on genetic algorithms. by Hydara, Isatou, Md Sultan, Abu Bakar, Zulzalil, Hazura, Admodisastro, Novia

    Published 2014
    “…The proposed approach is, so far, only implemented and validated on Java-based Web applications, although it can be implemented in other programming languages with slight modifications. …”
    Get full text
    Get full text
    Conference or Workshop Item