Search Results - (( developing interactive module algorithm ) OR ( java communication system algorithm ))
Search alternatives:
- developing interactive »
- interactive module »
- java communication »
- module algorithm »
- system algorithm »
-
1
Design of Improved Stream Cipher Algorithms for GSM Communication
Published 2024thesis::master thesis -
2
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
Get full text
Get full text
Conference or Workshop Item -
3
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014Get full text
Get full text
Undergraduates Project Papers -
4
Graphics, audio-visuals and interaction (GAI) based augmented reality (AR) system for symbian and android smartphone
Published 2012“…Color picking algorithm was used to build the interactions module. …”
Get full text
Get full text
Get full text
Thesis -
5
Network game (Literati) / Chung Mei Kuen
Published 2003“…The possible applications of multimedia-networked system are endless, as the demand to support interactive communication among groups of users has increased significantly. …”
Get full text
Get full text
Thesis -
6
Integrating Interactive Multimedia Objects in Mobile Augmented Reality for Sarawak Tourism
Published 2018“…Whereas, audio and video API for Android platform were used to build multimedia based audio and video module. As for interaction module, technique of color picking algorithm was applied. …”
Get full text
Get full text
Get full text
Get full text
Article -
7
Parallel distributed genetic algorithm development based on microcontrollers framework
Published 2023Conference paper -
8
Interactive learning package for artificial neural network (Demonstration Module) / Camellia Mohd Kamal
Published 2004“…Interactive Learning Package for Artificial Neural Network (Demonstration Module) is a learning package that allow the users to learn and enhance the understanding of the ANN subject in more detailed way and apply in the demonstration parts. …”
Get full text
Get full text
Thesis -
9
Text messaging encryption system
Published 2012“…At present, banking,commerce and passwords can only be communicated with internet connection or as in person verbally or in written;Text Messaging Encryption system needs to overcome this intermediate subjects and deliver instructions or messages instantaneously and securely. …”
Get full text
Get full text
Undergraduates Project Papers -
10
A cluster-based hybrid replica control protocol for high availability in data grid
Published 2019“…The first issue is, nodes in the Grid systems are dynamic where they can join or leave the system at any time. …”
Get full text
Get full text
Thesis -
11
Software module clustering based on the fuzzy adaptive teaching learning based optimization algorithm
Published 2019Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
12
Network monopoly / Tan Kean Yeap
Published 2002“…Accordingly, the pressure from the users of these systems for ways to communicate among all these machines is irresistible. …”
Get full text
Get full text
Thesis -
13
Visdom: Smart guide robot for visually impaired people
Published 2025“…An Android mobile application, developed using Java and the java.net.Socket library, provides an intuitive and accessible user interface for seamless interaction with the robot. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
14
Securing cloud data system (SCDS) for key exposure using AES algorithm
Published 2021“…After that we use to build securing cloud data system (SCDS) for key exposure using the AES algorithm for encrypting and decrypting our website cloud data and files. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
15
Biometric identification with limited data set
Published 2019Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
16
Classroom finder system with student availability, space and time constraint
Published 2024“…The primary focus of the system is on facilitating efficient and conflict-free room assignments while considering various constraints and requirements by exploring the suitable Artificial Intelligence approaches and scheduling algorithms. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
17
Encrypted mobile messaging application using AES block cipher cryptography algorithm / Nur Rasyiqah Zulkifli
Published 2019“…Advanced Encryption Standard algorithm is being used to encrypt the text messaging. …”
Get full text
Get full text
Student Project -
18
EasyA: Easy and effective way to generate pairwise test data
Published 2013Get full text
Get full text
Get full text
Conference or Workshop Item -
19
Secure E-Voting With Blind Signature
Published 2003“…The provider, which is an open source library, is used to provide the secure communication channel. The voter’s private key for digital signature is protected by using password-based encryption with SHA and Twofish-CBC algorithm so that only valid voter can use it.…”
Get full text
Get full text
Conference or Workshop Item -
20
Supervisory control and data acquisition system (SCADA) based customized remote terminal unit (RTU) for distribution automation system
Published 2008“…RTU will initiate the transaction with the digital input and output modules. Two proprietary software systems are used are to develop algorithm for the controller and to develop HMI for monitoring and controlling functions for the operator.…”
Get full text
Get full text
Get full text
Proceeding Paper
