Search Results - (( variable integration based algorithm ) OR ( java application model algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3
  4. 4

    Real-time algorithmic music composition application. by Yap, Alisa Yi Hui

    Published 2022
    “…This project is about the study of evolutionary music, and focuses on the development of an algorithmic music composer using the Java programming language. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  5. 5

    A meta-heuristics based input variable selection technique for hybrid electrical energy demand prediction models by ul Islam, B., Baharudin, Z.

    Published 2017
    “…The focus of the paper is to propose a hybrid approach for the selection of the most influential input variables for the training and testing of neural network based hybrid models. …”
    Get full text
    Get full text
    Article
  6. 6
  7. 7
  8. 8

    Enhanced Adaptive Confidence-Based Q Routing Algorithms For Network Traffic by Yap, Soon Teck

    Published 2004
    “…These two adaptive routing algorithms enhance the existing Confidence-based Q (CQ) and Confidence-based Dual Reinforcement Q (CDRQ) Routing Algorithms. …”
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10

    A Toolkit for Simulation of Desktop Grid Environment by FOROUSHAN, PAYAM CHINI

    Published 2014
    “…In this type of environment it is nearly impossible to prove the effectiveness of a scheduling algorithm. Hence the main objective of this study is to develop a desktop grid simulator toolkit for measuring and modeling scheduler algorithm performance. …”
    Get full text
    Get full text
    Final Year Project
  11. 11

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…The objective of this study is to enhance the confidentiality and security of the image steganography application by combining cryptography algorithm. In this proposed model, the RSA algorithm is used to encrypt a secret message into an unreadable ciphertext before hiding it in the image. …”
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12

    A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment by Ruzita, Ahmad

    Published 2013
    “…This thesis describes original research in the field of software quality model by presenting a Feature Ranking Algorithm (FRA) for Pragmatic Quality Factor (PQF) model. …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    ENGINEERING DESIGN WITH PSO ALGORITHM by MHD BASIR, SITI NUR HAJAR

    Published 2019
    “…Creating a PSO algorithm-based infrastructure integrating with the recommendation system will further enhance solution to the design problem. …”
    Get full text
    Get full text
    Final Year Project
  14. 14
  15. 15

    Shunt active power filter using hybrid fuzzy-proportional and crisp-integral control algorithms for total harmonic distortion improvement by Abdul Rahman, Nor Farahaida

    Published 2016
    “…First, unified ADALINEs based fundamental component extraction algorithm is proposed for dual functionality. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Cloudlet deployment and task offloading in mobile edge computing using variable-length whale and differential evolution optimization and analytical hierarchical process for decisio... by Daba, Layth Muwafaq Abdulhussein

    Published 2023
    “…Unlike the existing optimization algorithm, VL-WIDE features the capability of searching different lengths of solutions to cover the variable number of cloudlets for deployment. …”
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18

    Network game (Literati) / Chung Mei Kuen by Chung, Mei Kuen

    Published 2003
    “…Therefore, efficient and robust servers that process separate client connections in separate threads are needed. Java applet is a well-known and widely used example of mobile code (a variation on the traditional client-server model). …”
    Get full text
    Get full text
    Thesis
  19. 19

    Numerical algorithm of block method for general second order ODEs using variable step size by Nazreen Waeleh, Zanariah Abdul Majid

    Published 2017
    “…Consequently, a direct block multistep method with utilization of variable step size strategy is proposed. This method was developed for computing the solution at four points simultaneously and the derivation based on numerical integration as well as using interpolation approach. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20