Search Results - (( java _ implementation algorithm ) OR ( network solution using algorithm ))
Search alternatives:
- implementation algorithm »
- network solution »
- using algorithm »
- solution using »
-
1
Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework
Published 2004“…The work presented in this thesis discusses the problems of real-time audio streaming and investigates solutions for improving the audio data transmitting over the network.To achieve audio media data transmitting over the network in an efficient manner (realtime), the following issues: Initial delay of playing time (downloading time); current streaming protocols which can not cope well with network congestion; compression algorithms efficiency; network bandwidth utilization (network infrastructure); and security concerns of content owners, need to be considered.In this thesis, the implementation method of a real-time audio streaming service system is discussed. …”
Get full text
Get full text
Thesis -
2
Comparison of performances of Jaya Algorithm and Cuckoo Search algorithm using benchmark functions
Published 2022“…CS and JA have implemented in the same platform (Intellij IDEA Community Edition 2020.2.3) using the same language (Java). …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
3
Network monopoly / Tan Kean Yeap
Published 2002“…The algorithm design and implementation method mustnot only be workable, but also highly efficient in terms of execution speed and respond time. …”
Get full text
Get full text
Thesis -
4
Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography
Published 2009“…In this paper a new method is implementing to hide a file of unused area 2 within .EXE file and to detect the hidden file. …”
Get full text
Get full text
Get full text
Article -
5
RSA Encryption & Decryption using JAVA
Published 2006“…Today, with online marketing, banking, healthcare and other services, even the average householder is aware of encryption. The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
6
An Agent-Based System with Personalization and Intelligent Assistance Services for Facilitating Knowledge Sharing
Published 2006“…KSFaci is embedded in web environment and is implemented using Java Servlet and runs under Apache server. …”
Get full text
Get full text
Thesis -
7
Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC
Published 2021“…A new multi-factor authentication scheme is designed using the AES-ECC algorithm based on Kerberos workflow to establish secure, efficient, and lightweight communication between the user and the targeted IIoT devices to avoid the issues. …”
Get full text
Get full text
Thesis -
8
Provider independent cryptographic tools
Published 2003“…The library is implemented by using Java cryptographic service provider framework that conforms to Java Cryptographic Architecture (JCA) and Java Cryptographic Extension (JCE). …”
Get full text
Get full text
Get full text
Monograph -
9
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
10
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…RSA is one of these encryption algorithms that have been implemented in security systems. …”
Get full text
Get full text
Thesis -
11
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
12
Loss reduction in distribution networks using new network reconfiguration algorithm
Published 1996“…The first stage of this solution algorithm finds a loop which gives the maximum loss reduction in the network. …”
Get full text
Article -
13
Performance evaluation of real-time multiprocessor scheduling algorithms
Published 2016“…We hyave used the CPU profiler of Oracle JavaTM VisualVM to monitor the execution of LRE-TL as well as USG algorithms. …”
Get full text
Get full text
Conference or Workshop Item -
14
Network reconfiguration and control for loss reduction using genetic algorithm
Published 2010“…The proposed solution to this problem is based on a general combinatorial optimization algorithm known as Genetic Algorithm, and the load flow equations in distribution network. …”
Get full text
Get full text
Thesis -
15
Automatic Number Plate Recognition on android platform: With some Java code excerpts
Published 2016“…The main challenges of implementing ANPR algorithm on mobile phone are how to produce a higher coding efficiency, lower computational complexity, and higher scalability. …”
Get full text
Get full text
Get full text
Book -
16
Loss reduction in distribution networks by network reconfiguration: a two stage solution approach
Published 2004“…The first stage of this solution algorithm finds a loop, which gives the maximum loss reduction in the network. …”
Get full text
Get full text
Conference or Workshop Item -
17
Enhanced Adaptive Confidence-Based Q Routing Algorithms For Network Traffic
Published 2004“…An integrated solution for the above problem is the ECQ Routing Algorithm. …”
Get full text
Get full text
Thesis -
18
Fine-tuning approach in metaheuristic algorithm to prolong wireless sensor networks nodes lifetime
Published 2022“…A set of simulations has been performed using MATLAB R2018b on the proposed solution, namely the energy efficient of genetic (EEG) algorithm and has revealed that the solution outperforms the network lifetime and cluster head load of the existing solution.…”
Get full text
Get full text
Article -
19
Comparison between Lamarckian Evolution and Baldwin Evolution of neural network
Published 2006“…Baldwinian learning uses learning algorithm to change the fitness landscape, but the solution that is found is not encoded back into genetic string. …”
Get full text
Get full text
Get full text
Article -
20
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…Internet communication has become more common in this modern world recently, and one of the important algorithms used is ABS algorithm. However, most of the users have inadequate knowledge and understanding regard to this algorithm implementation in the communication field, as well as the level of security and accuracy will be questioned by the users because of the necessary to maintain the confidentiality of particular data transferred. …”
Get full text
Get full text
Undergraduates Project Papers
