Search Results - (( develop step function algorithm ) OR ( java communication system algorithm ))
Search alternatives:
- function algorithm »
- java communication »
- system algorithm »
- develop step »
-
1
Network monopoly / Tan Kean Yeap
Published 2002“…Moreover, because of the expanding memory anda processing power of these computers, users can put the machine to work on new kinds of applications and functions. Accordingly, the pressure from the users of these systems for ways to communicate among all these machines is irresistible. …”
Get full text
Get full text
Thesis -
2
Development of open platform controller for step-NC compliant CNC system
Published 2020“…The hardware of the system was upgraded with the new servo system combined with SSCNET implementation to improve the functionality and efficiency of the new system. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
3
Design of Improved Stream Cipher Algorithms for GSM Communication
Published 2024thesis::master thesis -
4
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
Get full text
Get full text
Conference or Workshop Item -
5
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014Get full text
Get full text
Undergraduates Project Papers -
6
Network game (Literati) / Chung Mei Kuen
Published 2003“…The possible applications of multimedia-networked system are endless, as the demand to support interactive communication among groups of users has increased significantly. …”
Get full text
Get full text
Thesis -
7
Sports tournament scheduling using genetic algorithm / Hafeezur Syakir Abdul Motok@Mohd Ridzuan
Published 2020“…These steps are repeat until a condition satisfied. The system uses the Rapid Application Development (RAD) methodology in system development and will be operate on a web-based platform. …”
Get full text
Get full text
Thesis -
8
Parallel distributed genetic algorithm development based on microcontrollers framework
Published 2023Conference paper -
9
-
10
One-step block methods for solving ordinary and delay differential equations
Published 2011“…The numerical results showed that the developed methods are better in terms of number of total steps,failure steps and function when compared with the existing methods in most problems tested. …”
Get full text
Get full text
Thesis -
11
Semiparametric inference procedure for the accelarated failure time model with interval-censored data
Published 2019“…Also, a one-step iterative algorithm, called expected rank algorithm, is introduced which is more complicated than the estimation-approximation algorithm, but more accurate. …”
Get full text
Get full text
Get full text
Thesis -
12
Text messaging encryption system
Published 2012“…At present, banking,commerce and passwords can only be communicated with internet connection or as in person verbally or in written;Text Messaging Encryption system needs to overcome this intermediate subjects and deliver instructions or messages instantaneously and securely. …”
Get full text
Get full text
Undergraduates Project Papers -
13
A cluster-based hybrid replica control protocol for high availability in data grid
Published 2019“…The first issue is, nodes in the Grid systems are dynamic where they can join or leave the system at any time. …”
Get full text
Get full text
Thesis -
14
Logic Programming In Radial Basis Function Neural Networks
Published 2013“…In this thesis also, I developed a new technique to extract the logic programming from radial basis function neural networks. …”
Get full text
Get full text
Thesis -
15
Visdom: Smart guide robot for visually impaired people
Published 2025“…An Android mobile application, developed using Java and the java.net.Socket library, provides an intuitive and accessible user interface for seamless interaction with the robot. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
16
Securing cloud data system (SCDS) for key exposure using AES algorithm
Published 2021“…After that we use to build securing cloud data system (SCDS) for key exposure using the AES algorithm for encrypting and decrypting our website cloud data and files. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
17
Biometric identification with limited data set
Published 2019Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
18
Block multistep methods for solving first order retarded and neutral delay differential equations
Published 2015“…The numerical solution of RDDE is then extended for solving the neutral delay differential equations (NDDE) of non-discontinuity and discontinuity cases. A new subroutine function has been added in the developed algorithm with the capabilities to approximate the neutral delay term using the interpolation of function evaluation. …”
Get full text
Get full text
Thesis -
19
Chebyshev approximation of discrete polynomials and splines
Published 2004“…These algorithms use either cubic splines or Lagrange polynomials to construct the approximation function. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
20
Chebyshev approximation of discrete polynomials and splines
Published 2004“…These algorithms use either cubic splines or Lagrange polynomials to construct the approximation function. …”
Get full text
Get full text
Get full text
Get full text
Thesis
