Search Results - (( developing solution using algorithm ) OR ( java communication system algorithm ))
Search alternatives:
- developing solution »
- java communication »
- system algorithm »
- using algorithm »
- solution using »
-
1
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
Get full text
Get full text
Conference or Workshop Item -
2
Network monopoly / Tan Kean Yeap
Published 2002“…The Network solution applies in this game system permits only low level of communication, particulary of sending and receiving limited amount of messages within network. …”
Get full text
Get full text
Thesis -
3
-
4
Development of open platform controller for step-NC compliant CNC system
Published 2020“…Therefore, this study covers the system which has been designed and developed from outdated and conventional PROLIGHT 1000 Milling CNC machine from Light Intelitek as the lesser cost solution which further discussed in detail based upon upgrades of hardware, architecture, and algorithm design. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
5
Design of Improved Stream Cipher Algorithms for GSM Communication
Published 2024thesis::master thesis -
6
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014Get full text
Get full text
Undergraduates Project Papers -
7
Network game (Literati) / Chung Mei Kuen
Published 2003“…The possible applications of multimedia-networked system are endless, as the demand to support interactive communication among groups of users has increased significantly. …”
Get full text
Get full text
Thesis -
8
Parallel distributed genetic algorithm development based on microcontrollers framework
Published 2023Conference paper -
9
Text messaging encryption system
Published 2012“…At present, banking,commerce and passwords can only be communicated with internet connection or as in person verbally or in written;Text Messaging Encryption system needs to overcome this intermediate subjects and deliver instructions or messages instantaneously and securely. …”
Get full text
Get full text
Undergraduates Project Papers -
10
A cluster-based hybrid replica control protocol for high availability in data grid
Published 2019“…The first issue is, nodes in the Grid systems are dynamic where they can join or leave the system at any time. …”
Get full text
Get full text
Thesis -
11
Visdom: Smart guide robot for visually impaired people
Published 2025“…An Android mobile application, developed using Java and the java.net.Socket library, provides an intuitive and accessible user interface for seamless interaction with the robot. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
12
Securing cloud data system (SCDS) for key exposure using AES algorithm
Published 2021“…After that we use to build securing cloud data system (SCDS) for key exposure using the AES algorithm for encrypting and decrypting our website cloud data and files. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
13
Biometric identification with limited data set
Published 2019Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
14
Classroom finder system with student availability, space and time constraint
Published 2024“…The primary focus of the system is on facilitating efficient and conflict-free room assignments while considering various constraints and requirements by exploring the suitable Artificial Intelligence approaches and scheduling algorithms. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
15
Encrypted mobile messaging application using AES block cipher cryptography algorithm / Nur Rasyiqah Zulkifli
Published 2019“…Advanced Encryption Standard algorithm is being used to encrypt the text messaging. …”
Get full text
Get full text
Student Project -
16
EasyA: Easy and effective way to generate pairwise test data
Published 2013Get full text
Get full text
Get full text
Conference or Workshop Item -
17
Secure E-Voting With Blind Signature
Published 2003“…The provider, which is an open source library, is used to provide the secure communication channel. The voter’s private key for digital signature is protected by using password-based encryption with SHA and Twofish-CBC algorithm so that only valid voter can use it.…”
Get full text
Get full text
Conference or Workshop Item -
18
Solving transcendental equation using genetic algorithm / Masitah Hambari
Published 2004“…Genetic Algorithm is used to find the roots or set of optimal solution that satisfy the equation. …”
Get full text
Get full text
Thesis -
19
Overview of metaheuristic: classification of population and trajectory
Published 2010“…Algorithms are used to find the solutions through the computer program. …”
Get full text
Get full text
Monograph -
20
Development of heuristic methods based on genetic algorithm (GA) for solving vehicle routing problem
Published 2008“…Genetic Algorithm gives a pool of solutions rather than just one. …”
Get full text
Get full text
Monograph
