Search Results - (( developing formative commitment algorithm ) OR ( java internet application algorithm ))

  • Showing 1 - 17 results of 17
Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…The key is the trigger mechanism to the algorithm. Until the advent of the Internet, encryption was rarely used by the public, but was largely a military tool. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    An Effective Fast Searching Algorithm for Internet Crawling Usage by Chia, Zhen Hon, Nor Azhar, Ahmad

    Published 2016
    “…The search algorithm is a crucial part in any internet applications. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework by Asaad Aref, Ibrahim

    Published 2004
    “…A design proposal was outlined to provide an adaptive client/server approach to stream audio contents using Real-Time Transport Protocol (RTP) involving architecture based on the Java Media Framework (JMF) Application Programmable Interfaces (API).RTP protocol is the Internet-standard protocol for the transport of real-time data, including audio and video and can be implemented by using Java Media Framework (JMF). …”
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5
  6. 6

    Implementation of (AES) Advanced Encryption Standard algorithm in communication application by Moh, Heng Huong

    Published 2014
    “…Internet communication has become more common in this modern world recently, and one of the important algorithms used is ABS algorithm. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  7. 7
  8. 8

    An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe by Yakub Kayode, Saheed, Kazeem Alagbe, Gbolagade

    Published 2017
    “…This paper proposes an efficient approach to improve Rivest Shamir Adleman (RSA) algorithm using parallel technique. RSA public-key cryptosystem has been the most popular and interesting security technique for majority of applications such as internet protocols, secure internet acces and electronic commerce. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Talkout : Protecting mental health application with a lightweight message encryption by Gavin Teo Juen

    Published 2022
    “…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  10. 10

    Securing cloud data system (SCDS) for key exposure using AES algorithm by Thabet Albatol, Mohammed Samer Hasan

    Published 2021
    “…Nowadays the internet communication playing the imperative role that used to transfer large amount of cloud data in various fields and website applications. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    Biometrics electronic purse by Abdul Rahman, Abdul Wahab, Eng, Chong Tan, S., M. Heng

    Published 1999
    “…This paper propose an eflcient and universal Smart Card System to be implemented for banking applications over the Internet to support the fast growing Electronic Commerce Industry. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  12. 12
  13. 13
  14. 14

    Web-based expert system for material selection of natural fiber- reinforced polymer composites by Ahmed Ali, Basheer Ahmed

    Published 2015
    “…As Java is platform independent and easy to be deployed in web based application and accessible through the World Wide Web (www), this expert system can be one stop application for materials selection.…”
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16
  17. 17

    Characterization of miR-3099-mediated posttranscriptional of target genes regulation during neurogenesis in mice by Zainal Abidin, Shahidee

    Published 2019
    “…In 2011, miR-3099 was found to be expressed as early as in the blastocyst stage, in which the expression was maintained until the developing E11.5 mouse brain. The expression of miR-3099 was further restricted to the cortical plate of the developing mouse brain between E13.5 and E17.5, coinciding with the time that the majority of the cells are committed to neuronal cell lineage. …”
    Get full text
    Get full text
    Thesis