Search Results - (( data location method algorithm ) OR ( java application design algorithm ))
Search alternatives:
- application design »
- method algorithm »
- java application »
- design algorithm »
- location method »
- data location »
-
1
Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption
Published 2022“…Subsequently, this project embedded with a lightweight Geo-Encryption algorithm to preserve the privacy of real-time GPS location. …”
Get full text
Get full text
Get full text
Academic Exercise -
2
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis -
3
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
4
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
5
-
6
-
7
Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework
Published 2004“…Java Media Framework library and the RTP protocol for audio transmission were used as development tools.The developed system designed in this thesis together with experimental results proved that the system could be implemented successfully. …”
Get full text
Get full text
Thesis -
8
Three phase fault algorithm in distribution system by using database approach and impedance based method
Published 2012“…A three phase fault location algorithm using database and impedance based method is utilized in distribution system to locate fault which may occur in any possible fault sections and to optimize the switching operations to reduce the outage time affected by fault. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
9
Implementing Location-Based Cryptography on Mobile Application Design to Secure Data in Cloud Storage
Published 2024journal::journal article -
10
-
11
Particle filter approach for tracking indoor user location using IEEE 802.11 signals
Published 2011“…The paper discussed the comparison between the true location and the estimated location based on two types of signals data: normal data and noise data. …”
Get full text
Get full text
Get full text
Article -
12
Particle filter approach for estimating indoor mobile user location using IEEE 802.11 signals (F1090)
Published 2011“…The paper discussed the comparison between the true location and the estimated location based on two types of signals data: normal data and noise data. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
13
Data clustering using the bees algorithm
Published 2007“…The authors’ team have developed a new population based search algorithm called the Bees Algorithm that is capable of locating near optimal solutions efficiently. …”
Get full text
Get full text
Conference or Workshop Item -
14
Design Of Robot Motion Planning Algorithm For Wall Following Robot
Published 2006Get full text
Get full text
Monograph -
15
-
16
-
17
Network game (Literati) / Chung Mei Kuen
Published 2003“…The main aspect of this thesis is to produce a networked gaming system, which process players. requested to play the game and enabling users to play the graphical game with people through the network. The algorithm design and implementation method must not only be workable, but also highly efficient in terms of execution speed and response time. …”
Get full text
Get full text
Thesis -
18
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…The application is designed to satisfy the user friendly interfaces and intent to be used by the end user without having the advanced knowledge in mobile security. …”
Get full text
Get full text
Conference or Workshop Item -
19
Experimental studies on impact damage location in composite aerospace structures using genetic algorithms and neural networks
Published 2010“…This paper compares two advanced signal processing methods for impact location in composite aircraft structures. …”
Get full text
Get full text
Get full text
Article -
20
Smart energy meter with adaptive communication data transfer algorithm for electrical energy monitoring
Published 2021“…In a conclusion, SEM prototype and adaptive communication data transfer algorithm with a combination of the three communication will be another method to solve a single communication problem of SM and suitable in residential location that offered the proposed communication infrastructure.…”
Get full text
Get full text
Thesis
