Search Results - (( development information using algorithmic ) OR ( java implementation developing algorithm ))
Search alternatives:
- implementation developing »
- development information »
- java implementation »
- information using »
-
1
Provider independent cryptographic tools
Published 2003“…The library is implemented by using Java cryptographic service provider framework that conforms to Java Cryptographic Architecture (JCA) and Java Cryptographic Extension (JCE). …”
Get full text
Get full text
Get full text
Monograph -
2
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
3
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
4
Route Optimization System
Published 2005“…Using that process, we have settled on Java as our development platform as we found it able to both implement DA and the GIS component (map display and manipulation). …”
Get full text
Get full text
Final Year Project -
5
Heavy Transportation Shortest Route using Dijkstra’s algorithm (HETRO) / Nurul Aqilah Ahmad Nezer
Published 2017“…The development tools used in developing this project is NetBeans by using Java for the implementation of the coding. …”
Get full text
Get full text
Thesis -
6
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…These data are processed and stored in appropriate formats in a MySQL server database. Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
Get full text
Get full text
Get full text
Article -
7
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
Get full text
Get full text
Conference or Workshop Item -
8
Movie recommendation system / Najwa Syamimie Hasnu
Published 2020“…The algorithm chosen was implemented using Java Programming language and was tested using Root Means Square Error (RMSE) formula.…”
Get full text
Get full text
Thesis -
9
Songs Search Using Human Humming Voice
Published 2007“…Java programming language is used to build the system. …”
Get full text
Get full text
Final Year Project -
10
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…The application was programmed by JAVA FX. The system was developed stage by stage as it is consist of many small components to form a large system. …”
Get full text
Get full text
Thesis -
11
Path planning for unmanned aerial vehicle (UAV) using rotated accelerated method in static outdoor environment
Published 2021“…In this study, a fast iterative method known as Rotated Successive Over-Relaxation (RSOR) is introduced. The algorithm is implemented in a self-developed 2D Java tool, UAV Planner. …”
Get full text
Get full text
Get full text
Get full text
Article -
12
Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption
Published 2022“…The selected lightweight geo-encryption algorithm will be implemented in the proposed system, vi which develops by using Java language. …”
Get full text
Get full text
Get full text
Academic Exercise -
13
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis -
14
Data Hiding Techniques In Digital Images
Published 2003“…After all these studies, one of the algorithms in the masking technique is developed and implemented using JAVA program to embed message into true color image with a good quality and higher capacity. …”
Get full text
Get full text
Thesis -
15
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…RSA is one of these encryption algorithms that have been implemented in security systems. …”
Get full text
Get full text
Thesis -
16
Smart student timetable planner
Published 2025“…The system is implemented using Node.js with Express for server-side development, HTML, CSS, and JavaScript for the frontend, and Socket.IO for real-time collaboration. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
17
Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework
Published 2004“…Java Media Framework library and the RTP protocol for audio transmission were used as development tools.The developed system designed in this thesis together with experimental results proved that the system could be implemented successfully. …”
Get full text
Get full text
Thesis -
18
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…The aim of the thesis is to provide an overview of the ABS encryptiOn algorithm, to develop a prototype that is implemented for communication purpose, and to test the developed prototype in terms of accuracy purpose. …”
Get full text
Get full text
Undergraduates Project Papers -
19
A Toolkit for Simulation of Desktop Grid Environment
Published 2014“…A simulator for desktop grid environment has been developed using Java as the implementation language due to its wide popularity. …”
Get full text
Get full text
Final Year Project -
20
Automatic Number Plate Recognition on android platform: With some Java code excerpts
Published 2016“…Performance of the proposed algorithm was evaluated on the developed number plates’ image database captured by mobile phone’s camera, i.e. 30 images. …”
Get full text
Get full text
Get full text
Book
