Search Results - (( java application interface algorithm ) OR ( using integrated protocol algorithm ))

Refine Results
  1. 1
  2. 2

    Real-time algorithmic music composition application. by Yap, Alisa Yi Hui

    Published 2022
    “…In addition, the system also utilises JavaFx and jFugue for its graphical user interface and music programming respectively. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  3. 3

    Application-Programming Interface (API) for Song Recognition Systems by Murtadha Arif Sahbudin, Chakib Chaouch, Salvatore Serrano

    Published 2024
    “…In addition the implementation is done by algorithm using Java’s programming language, executed through an application developed in the Android operating system. …”
    Article
  4. 4

    Visdom: Smart guide robot for visually impaired people by Lee, Zhen Ting

    Published 2025
    “…The system architecture integrates ROS 2 on a Raspberry Pi, with TCP/IP connectivity enabling remote operation. An Android mobile application, developed using Java and the java.net.Socket library, provides an intuitive and accessible user interface for seamless interaction with the robot. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  5. 5
  6. 6

    Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework by Asaad Aref, Ibrahim

    Published 2004
    “…A design proposal was outlined to provide an adaptive client/server approach to stream audio contents using Real-Time Transport Protocol (RTP) involving architecture based on the Java Media Framework (JMF) Application Programmable Interfaces (API).RTP protocol is the Internet-standard protocol for the transport of real-time data, including audio and video and can be implemented by using Java Media Framework (JMF). …”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8
  9. 9

    Secure Hybrid Scheme For Securing Mqtt Protocol Based On Enhanced Symmetric Algorithm by Hintaw, Ahmed Jameel

    Published 2023
    “…Internet of Things (IoT) enables device and machine communication using TCP/IP protocol. Message Queuing Telemetry Transport (MQTT) is the most preferred protocol and is expected to be the de facto messaging IoT standard. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Implementation of (AES) Advanced Encryption Standard algorithm in communication application by Moh, Heng Huong

    Published 2014
    “…The concept of ABS algorithm was firstly studied, including the definition, historical background, and a brief comparison was made between the ABS algorithm with other types of algorithm. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  11. 11
  12. 12

    Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design by Shamsiah, Suhaili, Norhuzaimin, Julai, Rohana, Sapawi, Nordiana, Rajaee

    Published 2024
    “…This article analyses a fast implementation of the Hash-based Message Authentication Code (HMAC), which uses its algorithm to ensure the validity and integrity of data to optimise hardware efficiency and design efficacy using the SHA-256 algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design by Shamsiah, Suhaili, Norhuzaimin, Julai, Rohana, Sapawi, Nordiana, Rajaee

    Published 2024
    “…This article analyses a fast implementation of the Hash-based Message Authentication Code (HMAC), which uses its algorithm to ensure the validity and integrity of data to optimise hardware efficiency and design efficacy using the SHA-256 algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    On the security of digital signature protocol based on iterated function systems. by M. G. AL-Saidi, Nadia, Md. Said, Mohamad Rushdan

    Published 2011
    “…A Diffie-Hellman algorithm is used to improve the security of the proposed protocol by generating the number of iteration that is used to find the attractor of the iterated function system, which is used to calculate the public key and the signature. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    QoS Forwarding on the Optical Internet Backbone Area Using R-IWDMTC Protocol by Addie Irawan, Hashim, R. Badlishah, Ahmad

    Published 2006
    “…The results were proved that the differentiation and integration technique could be applied in Optical Internet and gateway system by using R-IWDMTC protocol.…”
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    Effective routing protocol for wireless sensor networks using CRT-leach algorithm / Kamaldeen Ayodele Raji, Ayisat Wuraola Asaju-Gbolagade and Kazeem Alagbe Gbolagade by Ayodele Raji, Kamaldeen, Asaju-Gbolagade, Ayisat Wuraola, Gbolagade, Kazeem Alagbe

    Published 2021
    “…Chinese Remainder Theorem (CRT)- based packet splitting integrated with Low-Energy Adaptive Clustering Hierarchy (LEACH) algorithm routing protocol was proposed so as to decrease vitality utilization during correspondence and improve message dependability in WSNs. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Software Development For Conversion Of Ip To Wireless Atm (Watm) by Sudhakar, Swarnappa Clement

    Published 2002
    “…In this thesis, we propose the conversion algorithm that leads to a WATM packet assuming to use the TCP/IP protocol as the source. …”
    Get full text
    Get full text
    Thesis
  18. 18

    GSAR: Greedy Stand-Alone Position-Based Routing protocol to avoid hole problem occurance in Mobile Ad Hoc Networks by Al-Shugran, Mahmoud Ali

    Published 2014
    “…The Greedy Forwarding Strategy (GFS) has been the most used strategy in position-based routing protocols. …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    Implementation of Lamport Digital Signature Scheme in Station-to-station Protocol / Nur Ainaa Mat Abu ... [et al.] by Mat Abu, Nur Ainaa, Mohamad Sarif, Siti Nurfazliana, Mohammad Zuki, Intan Nur Athirah, Udin, Md Nizam

    Published 2021
    “…Thus, in this paper propose the new algorithm in Station to Station (STS) protocol by implementing Lamport digital signature to provide the authentication in DHKE protocol.…”
    Get full text
    Get full text
    Monograph
  20. 20

    Implementation of the Merkle-Hellman knapsack cryptosystem into station-to-station protocol / Nurzhulaika Yahya, Noor Izzah Agil and Nur ‘Afini Nordin by Yahya, Nurzhulaika, Agil, Noor Izzah, Nordin, Nur ‘Afini

    Published 2023
    “…The station-to-station protocol is integrated with the Merkle-Hellman knapsack cryptosystem for a particular use or application when the Merkle-Hellman knapsack cryptosystem is included into the protocol. …”
    Get full text
    Get full text
    Student Project