Search Results - (( developing effective changes algorithm ) OR ( java application service algorithm ))

Refine Results
  1. 1

    Talkout : Protecting mental health application with a lightweight message encryption by Gavin Teo Juen

    Published 2022
    “…The project objectives includes:(i) To investigate lightweight message encryption algorithms by benchmarking their efficiency in terms of computation speed and generated cipher text size; (ii) To design and develop the TalkOut mobile application with lightweight message encryption by using prototype software development model.; and (iii) To evaluate the usability performance of the developed proposed TalkOut mobile application using System Usability Scale (SUS) approach. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  2. 2

    Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system by Beg, Abul Hashem

    Published 2011
    “…The PLSR has been developed using Java Programming language. The system requirements also have been elaborated. …”
    Get full text
    Get full text
    Thesis
  3. 3

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
    Get full text
    Get full text
    Final Year Project
  4. 4
  5. 5

    Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework by Asaad Aref, Ibrahim

    Published 2004
    “…A design proposal was outlined to provide an adaptive client/server approach to stream audio contents using Real-Time Transport Protocol (RTP) involving architecture based on the Java Media Framework (JMF) Application Programmable Interfaces (API).RTP protocol is the Internet-standard protocol for the transport of real-time data, including audio and video and can be implemented by using Java Media Framework (JMF). …”
    Get full text
    Get full text
    Thesis
  6. 6

    Mathematical simulation for 3-dimensional temperature visualization on open source-based grid computing platform by Alias, Norma, Satam, Noriza, Abd. Ghaffar, Zarith Safiza, Darwis, Roziha, Hamzah, Norhafiza, Islam, Md. Rajibul

    Published 2009
    “…The development of this architecture is based on several programming language as it involves algorithm implementation on C, parallelization using Parallel Virtual Machine (PVM) and Java for web services development. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…A GUI is created in a form of JAVA application to display data detected from tag. …”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9

    Investigation of binary search algorithm as maximum power point tracking technique in Solar PV System by Meng, Chung Tiong, Hamdan, Daniyal, Mohd Herwan, Sulaiman, Mohd Shafie, Bakar

    Published 2018
    “…BSA exhibits a faster convergence speed with zero steady state oscillation. Both of the algorithms have shown the capability to adapt the rapid change irradiance condition effectively with tracking efficiency up to 99%.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    The effect of different similarity distance measures in detecting outliers using single-linkage clustering algorithm for univariate circular biological data by Nur Syahirah, Zulkipli, Siti Zanariah, Satari, Wan Nur Syahidah, Wan Yusoff

    “…Three circular similarity distance measures; Satari distance, Di distance and Chang-chien distance were used to detect outliers using a single-linkage clustering algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Study of climate change effects on rain height for satellite microwave links by Yong, Xin Yu

    Published 2024
    “…In this research paper, the study of climate change effects on rain height for satellite microwave links in Malaysia is being conducted. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  12. 12
  13. 13

    Reverse Engineering for Measuring Skin Ulcer Size with 3D Scanning by Teoh , Chia Yang

    Published 2014
    “…Other than that, the algorithm developed also has to be precise in order to achieve the objective of monitoring the changes in skin ulcer. …”
    Get full text
    Get full text
    Final Year Project
  14. 14

    A study on development of automation diagnosis of liquid based cytology by Seong, Hyun Kim, Han, Yeong Oh, Dong, Wook Kim

    Published 2015
    “…As such, this study was designed to develop some methods to increase the effectiveness of LBC. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Early detection for server availability in University Malaya data center / Mohd Azizi Osman by Osman, Mohd Azizi

    Published 2016
    “…The objective of the system is to design the detection algorithm for server availability, to develop the detection algorithm for server availability and to test the detection algorithm form server availability. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Inter-cell and intra-cell facility layout models under different demand environments in cellular manufacturing systems by Ariafar, Shahram

    Published 2012
    “…Moreover, the computation time (CPU Time) of the developed SA algorithm is significantly less than the benchmarked algorithm. …”
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18

    An Agent-Based System with Personalization and Intelligent Assistance Services for Facilitating Knowledge Sharing by Mohd Sharef, Nurfadhlina

    Published 2006
    “…KSFaci is embedded in web environment and is implemented using Java Servlet and runs under Apache server. The performance of KSFaci is evaluated using a four-factor evaluation metrics covering the user profile preciseness, recommendation service, staff directory and document repository. …”
    Get full text
    Get full text
    Thesis
  19. 19

    An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications by Hydara, Isatou

    Published 2015
    “…This research work was limited to Java based web applications. In future research, the method can be extended to include other programming languages as well as other similar web application security vulnerabilities.…”
    Get full text
    Get full text
    Thesis
  20. 20

    Monitoring the impacts of drought on land use/cover: a developed object-based algorithm for NOAA AVHRR time series data by Mokhtari, Ahmad, Mansor, Shattri, Mahmud, Ahmad Rodzi, Mohd Shafri, Helmi Zulhaidi

    Published 2011
    “…As a novel idea in this study, it developed a new object-based classification algorithm for AVHRR (Advanced Very High Resolution Radiometer) data. …”
    Get full text
    Get full text
    Get full text
    Article