Search Results - (( data making (programmer OR programmes) algorithm ) OR ( java application system algorithm ))
Search alternatives:
- java application »
- system algorithm »
- data making »
-
1
Immune-based technique for undergraduate programmes recommendation / Muhammad Azrill Mohd Zamri
Published 2017“…This study proposed an immunebased technique to recommend suitable undergraduate programmes to support applicants in decision-making. …”
Get full text
Get full text
Thesis -
2
-
3
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
Get full text
Get full text
Thesis -
4
Design and implementation of real data fast fourier transform processor on field programmable gates array
Published 2015“…In this work, the memorybased FFT processor, based on radix-4 FFT algorithm is implemented on Cyclone II Field Programmable Gates Array (FPGA). …”
Get full text
Get full text
Thesis -
5
Design of an advanced encryption standard crypto-processor core for field programmable gate array implementation
Published 2006“…The proposed AES Crypto-Processor accelerates the AES algorithm in reconfigurable Field Programmable Gate Arrays (FPGA). …”
Get full text
Get full text
Thesis -
6
-
7
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
8
Implementation Of Elevator Control System Using Raspberry PI
Published 2018“…Implementation of the proper algorithm in the elevator control system are vital to make sure system to run smoothly. …”
Get full text
Get full text
Monograph -
9
-
10
-
11
Real-time algorithmic music composition application.
Published 2022“…In addition, the system also utilises JavaFx and jFugue for its graphical user interface and music programming respectively. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
12
Programmable Spatially Variant Single Pixel Imaging Based On Compressive Sensing
Published 2021“…Single-pixel imaging system based on compressive sensing (CS) makes it possible to simultaneously compress and acquire image data, thus recovers images from measurements less than the requirement stated by Nyquist-Shannon theorem. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
13
Route Optimization System
Published 2005“…After much research into the many algorithms available, and considering some, including Genetic Algorithm (GA), the author selected Dijkstra's Algorithm (DA). …”
Get full text
Get full text
Final Year Project -
14
-
15
Optimization of blood vessel detection in retina images using multithreading and native code for portable devices
Published 2013Get full text
Get full text
Conference or Workshop Item -
16
-
17
Lightweight PRINCE algorithm IP core for securing GSM messaging using FPGA
Published 2023“…The system can cipher the data using PRINCE algorithm on a VIRTEX-403 FPGA evaluation board and using GSM modems to communicate over a cellular network. …”
Article -
18
Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework
Published 2004“…Java Media Framework library and the RTP protocol for audio transmission were used as development tools.The developed system designed in this thesis together with experimental results proved that the system could be implemented successfully. …”
Get full text
Get full text
Thesis -
19
A controller-agnostic random oracle based intrusion detection method in software defined networks / Adnan
Published 2016“…Such distinguishing features make SDNs flexible, vendor agnostic, programmable, cost effective, and create an innovative network environment. …”
Get full text
Get full text
Thesis -
20
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item
