Search Results - (( java application designing algorithm ) OR ( using generation based algorithm ))

Refine Results
  1. 1

    Message based random variable length key encryption algorithm. by Mirvaziri, Hamid, Jumari, Kasmiran, Ismail, Mahamod, Mohd Hanapi, Zurina

    Published 2009
    “…In order to overcome analysis mentioned above a new algorithm is designed that is based on random numbers and also can defeat time and memory constraints. …”
    Get full text
    Get full text
    Article
  2. 2

    Java based expert system for selection of natural fibre composite materials by Ahmed Ali, Basheer A., Salit, Mohd Sapuan, Zainudin, Edi Syams, Othman, Mohamed

    Published 2013
    “…Intensive research carried out to use natural fibres as alternative materials for petrochemical based synthetic materials to enforce green technology in manufacturing engineering. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Web-based expert system for material selection of natural fiber- reinforced polymer composites by Ahmed Ali, Basheer Ahmed

    Published 2015
    “…Conventional material selections are mostly based on the experience of product design engineers and the materials in common use. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Secure scheme for user authentication and authorization in android environment by Dar, Humaira, Al-Khateeb, Wajdi Fawzi Mohammed, Habaebi, Mohamed Hadi

    Published 2013
    “…Keeping in viewpoint of security on effective authentication and authorization, this paper proposes a technique that exponentially minimizes the operational cost by using secure hash algorithms that has the potential to generate mobile-based One Time Passwords (OTPs) scheme on Android environment ensuring enhanced protection with respect to password security. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption by Yeo Zi Zian

    Published 2022
    “…The selected lightweight geo-encryption algorithm will be implemented in the proposed system, vi which develops by using Java language. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  6. 6

    Development of least square adjustment application for traversing / Harith Fadhillah Soeb by Soeb, Harith Fadhillah

    Published 2019
    “…In addition, the development stage started by perform calculation process using MATLAB software. Next, the algorithm for calculation process was generated using the Eclipse application that uses Java programming language. …”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    Smart student timetable planner by Wong, Xin Tong

    Published 2025
    “…The system is implemented using Node.js with Express for server-side development, HTML, CSS, and JavaScript for the frontend, and Socket.IO for real-time collaboration. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  9. 9

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
    Get full text
    Get full text
    Final Year Project
  10. 10
  11. 11
  12. 12

    Sudoku Generator based on hybrid algorithm / Faridah Abdul Rahman by Abdul Rahman, Faridah

    Published 2012
    “…The objectives this research are to investigate hybrid algorithm in game generator, to develop Sudoku generator based on hybrid algorithm and lastly to test and evaluate the Sudoku generator using time comparison. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework by Asaad Aref, Ibrahim

    Published 2004
    “…Java Media Framework library and the RTP protocol for audio transmission were used as development tools.The developed system designed in this thesis together with experimental results proved that the system could be implemented successfully. …”
    Get full text
    Get full text
    Thesis
  14. 14

    An experimental study of neighbourhood based metaheuristic algorithms for test case generation satisfying the modified condition / decision coverage criterion by Haque, Ariful

    Published 2018
    “…The algorithms are used to generate test cases for nine different Boolean expressions of different size and complexities. …”
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16
  17. 17

    Network game (Literati) / Chung Mei Kuen by Chung, Mei Kuen

    Published 2003
    “…The main aspect of this thesis is to produce a networked gaming system, which process players. requested to play the game and enabling users to play the graphical game with people through the network. The algorithm design and implementation method must not only be workable, but also highly efficient in terms of execution speed and response time. …”
    Get full text
    Get full text
    Thesis
  18. 18

    SANAsms: Secure short messaging system for secure GSM mobile communication by Anuar, N.B., Azlan, I.M., Wahid, A.W.A., Zakaria, O.

    Published 2008
    “…The application is designed to satisfy the user friendly interfaces and intent to be used by the end user without having the advanced knowledge in mobile security. …”
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19

    Enhance key generation algorithm based user string identity as public key by Norhidayah, Muhammad

    Published 2015
    “…This study aims to enhance a previous algorithm called the Tripathi algorithm. The Tripathi algorithm proposes an RSA based approach to generate cryptographic keys using a user’s identity, such as an E-mail address. …”
    Get full text
    Get full text
    Thesis
  20. 20