Search Results - (( development programme gaining algorithm ) OR ( java data compression algorithm ))
Search alternatives:
- programme gaining »
- gaining algorithm »
- data compression »
- java »
-
1
Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework
Published 2004“…A design proposal was outlined to provide an adaptive client/server approach to stream audio contents using Real-Time Transport Protocol (RTP) involving architecture based on the Java Media Framework (JMF) Application Programmable Interfaces (API).RTP protocol is the Internet-standard protocol for the transport of real-time data, including audio and video and can be implemented by using Java Media Framework (JMF). …”
Get full text
Get full text
Thesis -
2
Data Hiding Techniques In Digital Images
Published 2003“…After all these studies, one of the algorithms in the masking technique is developed and implemented using JAVA program to embed message into true color image with a good quality and higher capacity. …”
Get full text
Get full text
Thesis -
3
SecPath: Energy efficient path reconstruction in wireless sensor network using iterative smoothing
Published 2019“…To achieve energy efficiency, it compresses the packet information by using GZIP tools in JAVA. …”
Get full text
Get full text
Thesis -
4
Energy efficient path reconstruction in wireless sensor network using iPath
Published 2019“…To achieve energy efficiency, it compresses the packet information by using GZIP tools in JAVA. …”
Get full text
Get full text
Get full text
Article -
5
Enhancing problem-solving skills of novice programmers in an introductory programming course
Published 2023Article -
6
-
7
A lightweight and secure algorithm of elliptic curve cryptography scalar multiplication using Q-NAF method in Lopez-Dahab coordinate
Published 2019“…By combining the proposed scalar arithmetic and the new point arithmetic 5P, a new scalar multiplication algorithm was developed. This scalar multiplication algorithm is named Q-NAF scalar multiplication for binary curve over Lopez-Dahab coordinates. …”
Get full text
Get full text
Thesis -
8
-
9
Beyond Grades - Predicting Programme Learning Outcomes with Multi-Output Regression in Malaysian Higher Education
Published 2025journal-article -
10
Security testing of web applications for detecting and removing second-order SQL injection vulnerabilities
Published 2022“…This technique also applies the removing algorithm, which uses escaping method to remove the detected vulnerabilities. …”
Get full text
Get full text
Thesis
