Search Results - (( developing integration process algorithm ) OR ( java application designing algorithm ))

Refine Results
  1. 1

    Web-based expert system for material selection of natural fiber- reinforced polymer composites by Ahmed Ali, Basheer Ahmed

    Published 2015
    “…As Java is platform independent and easy to be deployed in web based application and accessible through the World Wide Web (www), this expert system can be one stop application for materials selection.…”
    Get full text
    Get full text
    Thesis
  2. 2

    Development of least square adjustment application for traversing / Harith Fadhillah Soeb by Soeb, Harith Fadhillah

    Published 2019
    “…Next, the algorithm for calculation process was generated using the Eclipse application that uses Java programming language. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Smart student timetable planner by Wong, Xin Tong

    Published 2025
    “…To achieve these objectives, the system adopts the Rapid Application Development (RAD) methodology, ensuring iterative design, prototyping, and user feedback integration throughout the process. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  4. 4

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
    Get full text
    Get full text
    Final Year Project
  5. 5
  6. 6
  7. 7

    Integration of image processing algorithm and deep learning approaches to monitor ginger plant by Tan, Cheng Yong

    Published 2024
    “…This study aims to integrate image processing and deep learning algorithms to monitor the growth of ginger plants. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  8. 8

    Encrypted email using 3D AES block cipher algorithm / Khairah Mohd Wi by Mohd Wi, Khairah

    Published 2015
    “…This new application will produces a higher security services: authentication, confidential and integrity. Lastly, this project had accomplish all their objective which important in process of developing the mail prototype application using3D-AES block cipher as confidential process as integrity purpose.…”
    Get full text
    Get full text
    Thesis
  9. 9

    Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework by Asaad Aref, Ibrahim

    Published 2004
    “…Java Media Framework library and the RTP protocol for audio transmission were used as development tools.The developed system designed in this thesis together with experimental results proved that the system could be implemented successfully. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Implementation of local proprietary symmetric and asymmetric algorithm as secure plug-in on microsoft outlook / Mohd Izhar Jaafar by Jaafar, Mohd Izhar

    Published 2012
    “…It have increase complexity of process encryption and decryption. New integration also have an extra value security because of the symmetric algorithm was developed locally in Malaysia. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Integration of image processing algorithm and deep learning approaches to monitor ginger plant by Tan, Cheng Yong

    Published 2024
    “…This study aims to integrate image processing and deep learning algorithms to monitor the growth of ginger plants. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  12. 12
  13. 13
  14. 14
  15. 15

    Network game (Literati) / Chung Mei Kuen by Chung, Mei Kuen

    Published 2003
    “…The main aspect of this thesis is to produce a networked gaming system, which process players. requested to play the game and enabling users to play the graphical game with people through the network. The algorithm design and implementation method must not only be workable, but also highly efficient in terms of execution speed and response time. …”
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17

    SANAsms: Secure short messaging system for secure GSM mobile communication by Anuar, N.B., Azlan, I.M., Wahid, A.W.A., Zakaria, O.

    Published 2008
    “…The application is designed to satisfy the user friendly interfaces and intent to be used by the end user without having the advanced knowledge in mobile security. …”
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18

    Collaboration algorithms between intermediaries for supporting flexible supply chain management by Mohd Tamrin, Mohd Izzuddin, Tengku Sembok, Tengku Mohd, Kartiwi, Mira

    Published 2013
    “…The authors introduce Integrative Information Management Architecture (IIMA) running on collaboration algorithms which create semi automated intermediary processes to support management team address integration challenges. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19
  20. 20