Search Results - (( java application interface algorithm ) OR ( data protection a algorithm ))
Search alternatives:
- java application »
- protection a »
- a algorithm »
-
1
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…One of the solutions is to have a security application implemented in mobile phone device. …”
Get full text
Get full text
Conference or Workshop Item -
2
Real-time algorithmic music composition application.
Published 2022“…In addition, the system also utilises JavaFx and jFugue for its graphical user interface and music programming respectively. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
3
Application-Programming Interface (API) for Song Recognition Systems
Published 2024“…In addition the implementation is done by algorithm using Java’s programming language, executed through an application developed in the Android operating system. …”
Article -
4
Visdom: Smart guide robot for visually impaired people
Published 2025“…The system architecture integrates ROS 2 on a Raspberry Pi, with TCP/IP connectivity enabling remote operation. An Android mobile application, developed using Java and the java.net.Socket library, provides an intuitive and accessible user interface for seamless interaction with the robot. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
5
Development Of Machine Learning User Interface For Pump Diagnostics
Published 2022Get full text
Get full text
Monograph -
6
Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework
Published 2004“…A design proposal was outlined to provide an adaptive client/server approach to stream audio contents using Real-Time Transport Protocol (RTP) involving architecture based on the Java Media Framework (JMF) Application Programmable Interfaces (API).RTP protocol is the Internet-standard protocol for the transport of real-time data, including audio and video and can be implemented by using Java Media Framework (JMF). …”
Get full text
Get full text
Thesis -
7
Movie recommendation system / Najwa Syamimie Hasnu
Published 2020Get full text
Get full text
Thesis -
8
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…The concept of ABS algorithm was firstly studied, including the definition, historical background, and a brief comparison was made between the ABS algorithm with other types of algorithm. …”
Get full text
Get full text
Undergraduates Project Papers -
9
Design Of Robot Motion Planning Algorithm For Wall Following Robot
Published 2006Get full text
Get full text
Monograph -
10
Discovering decision algorithm of distance protective relay based on rough set theory and rule quality measure
Published 2011“…The KDD approach was applied on a simulated event report recording ‘extracted’ from a numerical distance relay that had been modeled to emulate an actual distance protective relay device used by TNB, a Malaysian utility company. …”
Get full text
Get full text
Thesis -
11
Discovering decision algorithm from a distance relay event report
Published 2009“…This derived algorithm, aptly known as relay CD-prediction rules, can later be used as a knowledge base in support of a protection system analysis expert system to predict, validate or even diagnose future unknown relay events. …”
Get full text
Get full text
Get full text
Article -
12
Rough-Set-and-Genetic-Algorithm based data mining and Rule Quality Measure to hypothesize distance protective relay operation characteristics from relay event report
Published 2011“…This paper investigates the implementation of a novel data mining approach of integrated-Rough-Set-and-Genetic-Algorithm based rule discovery and Rule Quality Measure to hypothesize expected relay behavior in the form of an association rule from digital protective relay’s resident event report. …”
Get full text
Get full text
Article -
13
-
14
On protecting data storage in mobile cloud computing paradigm
Published 2014“…That way, it ensures strong data protection ability, because part of the data is stored in one server located at a location and another part of the data is stored in another server located at a far different location. …”
Get full text
Get full text
Get full text
Article -
15
-
16
An enhancement of the random sequence 3-level obfuscated algorithm for protecting agents malicious hosts
Published 2007“…The Random Sequence 3-level obfuscated algorithm has been proposed by the authors to improve agent security: in this paper, an enhancement to the protection level of this algorithm is proposed. …”
Get full text
Get full text
Article -
17
Web-based expert system for material selection of natural fiber- reinforced polymer composites
Published 2015“…As Java is platform independent and easy to be deployed in web based application and accessible through the World Wide Web (www), this expert system can be one stop application for materials selection.…”
Get full text
Get full text
Thesis -
18
Protection of the texts using Base64 and MD5
Published 2012“…The main objective of the use of encryption algorithms is to protect data and information in order to achieve privacy. …”
Get full text
Get full text
Get full text
Article -
19
Cryptographic Algorithm Using Matrix Inversion as Data Protection
Published 2011“…The algorithms were tested with samples of real data and the result practically demonstrated how systems of non-linear equations turned into linear equations are indeed of relevance in providing strong and complex encryption and decryption keys to protect sensitive information in store or in transit via unsecure channels. …”
Get full text
Get full text
Get full text
Article -
20
A Study And Analysis Of Watermarking Algorithms For Medical Images
Published 2010Get full text
Get full text
Thesis
