Search Results - (( based application protocol algorithm ) OR ( java application based algorithm ))
Search alternatives:
- application protocol »
- protocol algorithm »
- based application »
- application based »
- java application »
-
1
Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework
Published 2004“…A design proposal was outlined to provide an adaptive client/server approach to stream audio contents using Real-Time Transport Protocol (RTP) involving architecture based on the Java Media Framework (JMF) Application Programmable Interfaces (API).RTP protocol is the Internet-standard protocol for the transport of real-time data, including audio and video and can be implemented by using Java Media Framework (JMF). …”
Get full text
Get full text
Thesis -
2
-
3
Implementation of RIO in UMJaNetSim / Chan Chin We
Published 2004Get full text
Get full text
Thesis -
4
Tacit knowledge for business intelligence framework using cognitive-based approach
Published 2022“…The framework was tested on 23 librarians from several university libraries in West Java and Yogyakarta, Indonesia. The algorithm starts with a content targeted interview to identify the list of problems faced by librarians. …”
Get full text
Get full text
Thesis -
5
-
6
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
7
New algorithms to minimize handoff latency in AMTree protocol
Published 2009Get full text
Get full text
Get full text
Article -
8
Developing A Control Protocol Algorithm For Stimulating The Street Light System
Published 2017Get full text
Get full text
Monograph -
9
Development of open platform controller for step-NC compliant CNC system
Published 2020“…Therefore, this study covers the system which has been designed and developed from outdated and conventional PROLIGHT 1000 Milling CNC machine from Light Intelitek as the lesser cost solution which further discussed in detail based upon upgrades of hardware, architecture, and algorithm design. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
10
-
11
Clustering Methods For Cluster-Based Routing Protocols In Wireless Sensor Networks: Comparative Study
Published 2017“…In this paper, numerous energy efficient routing algorithms for hierarchical routing protocol in Wireless Sensor Networks have been discussed based on the clustering approaches. …”
Get full text
Get full text
Get full text
Article -
12
Secured Autonomous Agent-Based Intrusion Detection System (SAAIDS)
Published 2024thesis::master thesis -
13
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
14
-
15
Efficient and scalable ant colony optimization based WSN routing protocol for IoT
Published 2020“…The evaluation results have recorded an improvement in conservation of energy, of almost 50% less consumed energy even with an increase in the number of nodes, by comparing with an existing routing technique based on ant system, a current routing protocol for IoT and the conventional ACO algorithm. © 2020 ASTES Publishers. …”
Get full text
Get full text
Get full text
Get full text
Article -
16
Application of genetic algorithm and JFugue in an evolutionary music generator
Published 2025“…This project explores the application of Genetic Algorithms (GA) with JFugue, which is a Java-based music programming library to develop an Evolutionary Music Generator. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
17
A secure trust aware ACO-Based WSN routing protocol for IoT
Published 2022“…The performance of the proposed routing algorithm is demonstrated through MATLAB. Based on the proposed system, to find the secure and optimal path while aiming at providing trust in IoT environment, the average energy consumption is minimized by nearly 50% even as the number of nodes has increased, as compared with the conventional ACO algorithm, a current ant-based routing algorithm for IoT-communication, and a present routing protocol RPL for IoT.…”
Get full text
Get full text
Get full text
Article -
18
Performance analysis of AES (Advance Encryption Standard) in IPSec (Internet Protocol Security) / Nik Shahidah Afifi Md Taujuddin, Abdul Hanan Abdullah and Mohd Aizaini Maarof
Published 2006“…These algorithms are being used as encryption algorithm in Encapsulated Security Payload (ESP) protocol. …”
Get full text
Get full text
Conference or Workshop Item -
19
-
20
