Search Results - (( developing function _ algorithm ) OR ( java communication technologies algorithm ))
Search alternatives:
- communication technologies »
- technologies algorithm »
- developing function »
- java communication »
-
1
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…J2ME phone and Symbian Operating System (OS) as the platform for the application to run. The encryption algorithm that implemented in the system is Advanced Encryption Standard (AES) with 128-bit block size and together with the SHA1 (Secure Hash Algorithm) hash functions. …”
Get full text
Get full text
Conference or Workshop Item -
2
Visdom: Smart guide robot for visually impaired people
Published 2025“…An Android mobile application, developed using Java and the java.net.Socket library, provides an intuitive and accessible user interface for seamless interaction with the robot. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
3
Design of Improved Stream Cipher Algorithms for GSM Communication
Published 2024thesis::master thesis -
4
Development of open platform controller for step-NC compliant CNC system
Published 2020“…Therefore, this study covers the system which has been designed and developed from outdated and conventional PROLIGHT 1000 Milling CNC machine from Light Intelitek as the lesser cost solution which further discussed in detail based upon upgrades of hardware, architecture, and algorithm design. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
5
-
6
-
7
A survey of energy-aware real time scheduling tools
Published 2015Get full text
Get full text
Conference or Workshop Item -
8
Mobile Vision-based Automatic Counting of Bacteria Colonies
Published 2017Get full text
Get full text
Get full text
Article -
9
Secure E-Voting With Blind Signature
Published 2003“…E-Voting is implemented by employing Java socket technology and BouncyCastle cryptography provider. …”
Get full text
Get full text
Conference or Workshop Item -
10
Talkout : Protecting mental health application with a lightweight message encryption
Published 2022“…The rise of technology and the Internet has changed how people communicate in society and virtual counselling development since the 1970s. …”
Get full text
Get full text
Get full text
Academic Exercise -
11
Classroom finder system with student availability, space and time constraint
Published 2024Get full text
Get full text
Final Year Project / Dissertation / Thesis -
12
A block cipher based on genetic algorithm
Published 2016“…This complexity can be done by designing an algorithm that consists of substitution function and permutation function which provides confusion and diffusion properties. …”
Get full text
Get full text
Get full text
Thesis -
13
Quantum-Behaved Lightning Search Algorithm to Improve Indirect Field-Oriented Fuzzy-PI Control for im Drive
Published 2023Conference Paper -
14
Computing the autopilot control algorithm using predictive functional control for unstable model
Published 2009“…This paper discusses the computing development of a control algorithm using Predictive Functional Control (PFC) for model-based that having one or more unstable poles. …”
Get full text
Get full text
Conference or Workshop Item -
15
Development and applications of metaheuristic algorithms in engineering design and structural optimization / Ali Sadollah
Published 2013“…In addition, two novel optimization methods are developed and presented which are named the mine blast algorithm (MBA) and the water cycle algorithm (WCA). …”
Get full text
Get full text
Thesis -
16
Effort Estimation Model for Function Point Measurement
Published 2007“…This research work has generated an algorithmic effort estimation model for function points measurement. …”
Get full text
Get full text
Thesis -
17
Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC
Published 2021“…A new multi-factor authentication scheme is designed using the AES-ECC algorithm based on Kerberos workflow to establish secure, efficient, and lightweight communication between the user and the targeted IIoT devices to avoid the issues. …”
Get full text
Get full text
Thesis -
18
Chebyshev approximation of discrete polynomials and splines
Published 2004“…These algorithms use either cubic splines or Lagrange polynomials to construct the approximation function. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
19
Chebyshev approximation of discrete polynomials and splines
Published 2004“…These algorithms use either cubic splines or Lagrange polynomials to construct the approximation function. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
20
Logic Programming In Radial Basis Function Neural Networks
Published 2013“…In this thesis also, I developed a new technique to extract the logic programming from radial basis function neural networks. …”
Get full text
Get full text
Thesis
