Search Results - (( java application need algorithm ) OR ( using interactive protocol algorithm ))
Search alternatives:
- interactive protocol »
- protocol algorithm »
- java application »
- application need »
- need algorithm »
-
1
Deniable authentication protocol based on factoring and discrete logarithm problems
Published 2022“…In terms of communication overhead, the non-interactive protocol is more effective than the interactive protocol. …”
Get full text
Get full text
Conference or Workshop Item -
2
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
3
Real-Time Video Processing Using Native Programming on Android Platform
Published 2012“…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
4
Performance analysis of multipath routing based on source routing
Published 2010Get full text
Working Paper -
5
Vehicular ad-hoc network (vanets) for electrical vehicle charging management
Published 2025text::Thesis -
6
Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework
Published 2004“…A design proposal was outlined to provide an adaptive client/server approach to stream audio contents using Real-Time Transport Protocol (RTP) involving architecture based on the Java Media Framework (JMF) Application Programmable Interfaces (API).RTP protocol is the Internet-standard protocol for the transport of real-time data, including audio and video and can be implemented by using Java Media Framework (JMF). …”
Get full text
Get full text
Thesis -
7
Parallel distributed genetic algorithm development based on microcontrollers framework
Published 2023Conference paper -
8
Quality of service performances of three mobile ad hoc network protocols
Published 2009“…The thesis proposed to evaluate the Quality of Service (QoS) performances of three types MANET protocols. The protocols included the Dynamic Source Routing (DSR), Ad Hoc On-demand Distance Vector (AODV) and Temporally Ordered Routing Algorithm (TORA) protocol. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
9
Network game (Literati) / Chung Mei Kuen
Published 2003“…Therefore, efficient and robust servers that process separate client connections in separate threads are needed. Java applet is a well-known and widely used example of mobile code (a variation on the traditional client-server model). …”
Get full text
Get full text
Thesis -
10
Automated time series forecasting
Published 2011Get full text
Get full text
Get full text
Monograph -
11
Enhancement of Security Architecture for Smartcard Based Authentication Protocols
Published 2004“…In particular, important issues such as how smartcard applications can be modeled using UML techniques and how UML can be used to sketch the operations for implementing a secure access using smartcard has been addressed.…”
Get full text
Get full text
Thesis -
12
Multipath routing protocol based on cross-layer approach for MANET
Published 2017“…In an effort to improve the performance of MANETs, there has been increased in protocols that rely on cross-layer interaction between different layers. …”
Get full text
Get full text
Get full text
Article -
13
Encrypted mobile messaging application using AES block cipher cryptography algorithm / Nur Rasyiqah Zulkifli
Published 2019“…The programming language that is used to write the program is Java Language that will run on android phones. As the result, this project was tested on the functionality of the mobile messaging application. …”
Get full text
Get full text
Student Project -
14
Design Of Robot Motion Planning Algorithm For Wall Following Robot
Published 2006Get full text
Get full text
Monograph -
15
Text messaging encryption system
Published 2012Get full text
Get full text
Undergraduates Project Papers -
16
Hybrid genetic algorithm for improving fault localization
Published 2018“…The result of the experiment shows that our technique able to detect multiple faults in various java programs but there is a need for improvement especially in prioritize fault that occurs simultaneously.…”
Get full text
Get full text
Get full text
Article -
17
-
18
A comprehensive analysis of surface electromyography for control of lower limb exoskeleton
Published 2016“…The RMSE for both protocols were relatively low varying between 6.88 and 8.31. …”
Get full text
Get full text
Thesis -
19
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…This thesis is based on the application of sentiment classification algorithm to tweet data with the goal of classifying messages based on the polarity of sentiment towards a particular topic (or subject matter). …”
Get full text
Get full text
Get full text
Thesis -
20
Biometric identification with limited data set
Published 2019Get full text
Get full text
Get full text
Get full text
Proceeding Paper
