Search Results - (( developing access learning algorithm ) OR ( java application designing algorithm ))
Search alternatives:
- application designing »
- designing algorithm »
- learning algorithm »
- developing access »
- java application »
-
1
Talkout : Protecting mental health application with a lightweight message encryption
Published 2022“…The project objectives includes:(i) To investigate lightweight message encryption algorithms by benchmarking their efficiency in terms of computation speed and generated cipher text size; (ii) To design and develop the TalkOut mobile application with lightweight message encryption by using prototype software development model.; and (iii) To evaluate the usability performance of the developed proposed TalkOut mobile application using System Usability Scale (SUS) approach. …”
Get full text
Get full text
Get full text
Academic Exercise -
2
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
3
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
4
-
5
-
6
-
7
-
8
Meta-Heuristic Algorithms for Learning Path Recommender at MOOC
Published 2021Get full text
Get full text
Article -
9
Development of deep reinforcement learning based resource allocation techniques in cloud radio access network
Published 2022Get full text
Get full text
Final Year Project / Dissertation / Thesis -
10
-
11
-
12
Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework
Published 2004“…Java Media Framework library and the RTP protocol for audio transmission were used as development tools.The developed system designed in this thesis together with experimental results proved that the system could be implemented successfully. …”
Get full text
Get full text
Thesis -
13
-
14
-
15
-
16
-
17
Design Of Robot Motion Planning Algorithm For Wall Following Robot
Published 2006Get full text
Get full text
Monograph -
18
Revolutionizing Perimeter Intrusion Detection: A Machine Learning-Driven Approach with Curated Dataset Generation for Enhanced Security
Published 2023“…After collecting the data from above mentioned sensors we applied machine learning algorithms DBSCAN to cluster the data points and K-NN classification to classify those clusters in one-dimensional data, but the results were not much satisfying. …”
Get full text
Get full text
Article -
19
-
20
Recent Automatic Segmentation Algorithms of MRI Prostate Regions: A Review
Published 2021Get full text
Get full text
Article
