Search Results - (( developing coding means algorithm ) OR ( java application designing algorithm ))
Search alternatives:
- application designing »
- designing algorithm »
- developing coding »
- java application »
- means algorithm »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
2
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
3
Simulation of shortest path using a-star algorithm / Nurul Hani Nortaja
Published 2004“…As for WXES3l82, the thesis cover the development of programming code, the code implementation and testing and the evaluation including discussion about the problem/constraints meed in the coding program development. …”
Get full text
Get full text
Thesis -
4
-
5
-
6
WAVELET-DCT BASED IMAGE CODER FOR VIDEO CODING APPLICATIONS
Published 2007“…This project is about the implementation ofWavelet-DCT intra-frame coder for video coding applications. Wavelet-DCT is a novel algorithm that uses Forward Discrete Wavelet Transform (DWT) to compute DCT. …”
Get full text
Get full text
Final Year Project -
7
Single Frame Profilometry With Rapid Phase Demodulation On Colour-Coded Fringes
Published 2019“…Therefore, a corresponding fringe analysis algorithm was developed for De Bruijn colour-coded fringe pattern to circumvent the conventional phase unwrapping techniques which are unreliable and time-consuming. …”
Get full text
Get full text
Thesis -
8
Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework
Published 2004“…Java Media Framework library and the RTP protocol for audio transmission were used as development tools.The developed system designed in this thesis together with experimental results proved that the system could be implemented successfully. …”
Get full text
Get full text
Thesis -
9
-
10
Reported malicious codes incident within malaysia’s landscape: time series modelling and a timeline analysis
Published 2022“…The best model is chosen by the least values of mean absolute error (MAE), root mean squared error (RMSE), and mean absolute percentage error (MAPE). …”
Get full text
Get full text
Undergraduates Project Papers -
11
Design and evaluation of multidimensional turbo product coded MIMO-OFDM system
Published 2007“…The initial work is developing the dimensional-based reading order (DBRO) algorithm for generating the MDTPC codeword sequences. …”
Get full text
Get full text
Thesis -
12
Real-Time Implementation Of LPC-10 Codec On TMS320C6713 DSP
Published 2012“…During last two decades various speech coding algorithms have been developed. The range of toll speech frequency is from 300 Hz- 3400 Hz. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
13
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…Third approach is transforming identifiers to junk code to hide the meaning and increase the complexity of the code. …”
Get full text
Get full text
Thesis -
14
Design Of Robot Motion Planning Algorithm For Wall Following Robot
Published 2006Get full text
Get full text
Monograph -
15
Performance of MIMO space-time coded system and training based channel estimation for MIMO-OFDM system
Published 2006“…Therefore in this part QR decomposition algorithm has been investigated as a solution. For doing so, the performance analysis between QR decomposition and LS algorithm in terms of MSE (Mean Square Error) and BER (Bit Error Rate) has been done using simulations software. …”
Get full text
Get full text
Thesis -
16
-
17
Network game (Literati) / Chung Mei Kuen
Published 2003“…The main aspect of this thesis is to produce a networked gaming system, which process players. requested to play the game and enabling users to play the graphical game with people through the network. The algorithm design and implementation method must not only be workable, but also highly efficient in terms of execution speed and response time. …”
Get full text
Get full text
Thesis -
18
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…The application is designed to satisfy the user friendly interfaces and intent to be used by the end user without having the advanced knowledge in mobile security. …”
Get full text
Get full text
Conference or Workshop Item -
19
System identification using Extended Kalman Filter
Published 2017“…System identification is getting more intensive from researcher to develop an algorithm with work efficiently and more accurate. …”
Get full text
Get full text
Student Project -
20
