Search Results - (( development process interception algorithm ) OR ( java data compression algorithm ))*

  • Showing 1 - 8 results of 8
Refine Results
  1. 1

    Implementation of local proprietary symmetric and asymmetric algorithm as secure plug-in on microsoft outlook / Mohd Izhar Jaafar by Jaafar, Mohd Izhar

    Published 2012
    “…It have increase complexity of process encryption and decryption. New integration also have an extra value security because of the symmetric algorithm was developed locally in Malaysia. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework by Asaad Aref, Ibrahim

    Published 2004
    “…A design proposal was outlined to provide an adaptive client/server approach to stream audio contents using Real-Time Transport Protocol (RTP) involving architecture based on the Java Media Framework (JMF) Application Programmable Interfaces (API).RTP protocol is the Internet-standard protocol for the transport of real-time data, including audio and video and can be implemented by using Java Media Framework (JMF). …”
    Get full text
    Get full text
    Thesis
  3. 3

    An efficient likelihood-based modulation classification algorithm for multiple-input multiple-output systems by Bahloul, M.R., Yusoff, M.Z., Abdel-Aty, A.-H., Saad, M.N.M.

    Published 2016
    “…To overcome the problems associated with the existing likelihood-based MC algorithms, a new algorithm is developed in this paper. …”
    Get full text
    Get full text
    Article
  4. 4

    Development of algorithm for single axis sun tracking system by Yi, L.Z., Singh, B.S.M., Ching, D.L.C., Jin, C.L.E.

    Published 2016
    “…The proposed algorithm displays real-time processed data that would enable users to understand the trend of the SEGS output for maintenance prediction and optimization purposes. …”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Data Hiding Techniques In Digital Images by Al Thloothi, Salah Ramadan

    Published 2003
    “…After all these studies, one of the algorithms in the masking technique is developed and implemented using JAVA program to embed message into true color image with a good quality and higher capacity. …”
    Get full text
    Get full text
    Thesis
  6. 6

    SecPath: Energy efficient path reconstruction in wireless sensor network using iterative smoothing by Abd, Wamidh Jwdat

    Published 2019
    “…To achieve energy efficiency, it compresses the packet information by using GZIP tools in JAVA. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Energy efficient path reconstruction in wireless sensor network using iPath by Hasan, Sazlinah, Abd, Wamidh Jwdat, Ariffin, Ahmad Alauddin

    Published 2019
    “…To achieve energy efficiency, it compresses the packet information by using GZIP tools in JAVA. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    A classifier mechanism for host based intrusion detection and prevention system in cloud computing environment by Al-Zarqawee, Aws Naser

    Published 2018
    “…The mechanism’s design is based on the hybrid Antlion Optimization Algorithm (ALO) with Multilayer Perceptron (MLP) to protect against DDoS attacks. …”
    Get full text
    Get full text
    Thesis