Search Results - (( java application service algorithm ) OR ( parameter implementation drops algorithm ))
Search alternatives:
- parameter implementation »
- implementation drops »
- application service »
- service algorithm »
- java application »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
2
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
3
Mathematical modelling of mass transfer in a multi-stage rotating disc contactor column
Published 2005“…This eventually brought the study to the implementation of the Inverse Single Drop Multistage (ISDMS)-2D Fuzzy Algorithm on the Mass Transfer of Multiple Drops in Multistage System. …”
Get full text
Get full text
Thesis -
4
Time based internet traffic policing and shaping with Weibull traffic model / Mohd Azrul Abdullah
Published 2015“…Two important Weibull parameters which are shape and scale are measured. Based on the identified statistical parameters, a new Time Based Policing and Shaping algorithm is developed and simulated. …”
Get full text
Get full text
Article -
5
Time based internet traffic policing and shaping with Weibull traffic model / Mohd Azrul Abdullah
Published 2015“…Two important Weibull parameters which are shape and scale are measured. Based on the identified statistical parameters, a new Time Based Policing and Shaping algorithm is developed and simulated. …”
Get full text
Get full text
Thesis -
6
Experimental implementation controlled SPWM inverter based harmony search algorithm
Published 2017“…Then, the control algorithm of the inverter prototype is experimentally implemented using the eZdsp F28355 board along with the bipolar sinusoidal pulse width modulation (SPWM) to control the output voltage drop under different load conditions. …”
Get full text
Get full text
Get full text
Article -
7
Experimental implementation controlled SPWM inverter based harmony search algorithm
Published 2023Article -
8
Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework
Published 2004“…A design proposal was outlined to provide an adaptive client/server approach to stream audio contents using Real-Time Transport Protocol (RTP) involving architecture based on the Java Media Framework (JMF) Application Programmable Interfaces (API).RTP protocol is the Internet-standard protocol for the transport of real-time data, including audio and video and can be implemented by using Java Media Framework (JMF). …”
Get full text
Get full text
Thesis -
9
TDMA scheduling analysis of energy consumption for iot wireless sensor network
Published 2019“…The algorithm use time division multiplexing algorithm together with hello message to allocate the neighbors and their energy level to find the best way to communicate and reduce packet drop, less signal interference and increase throughput. …”
Get full text
Get full text
Thesis -
10
Mathematical simulation for 3-dimensional temperature visualization on open source-based grid computing platform
Published 2009“…The development of this architecture is based on several programming language as it involves algorithm implementation on C, parallelization using Parallel Virtual Machine (PVM) and Java for web services development. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
11
Real-Time Implementation Of LPC-10 Codec On TMS320C6713 DSP
Published 2012“…The focus on LPC-10 was implemented on the DSP board TMS320C6713 to test the LPC-10 algorithm in realtime. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
12
Talkout : Protecting mental health application with a lightweight message encryption
Published 2022“…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
Get full text
Get full text
Get full text
Academic Exercise -
13
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…A GUI is created in a form of JAVA application to display data detected from tag. …”
Get full text
Get full text
Thesis -
14
-
15
Effects of Authentication of Users in Mobile Internet Protocol Version 6
Published 2004“…Various network topologies are simulated in order to investigate the effects of implementing this program on a network for various network performance parameters. …”
Get full text
Get full text
Thesis -
16
Bio-inspired network on chip having both guaranteed throughput and best effort services using fault-tolerant algorithm
Published 2018“…Cache updates is an example of BE noncritical traffic. In this paper, we implement a novel biologically inspired fault-tolerant algorithm that provides both GT and BE QoS. …”
Get full text
Get full text
Article -
17
Bio-inspired network on chip having both guaranteed throughput and best effort services using fault-tolerant algorithm
Published 2018“…Cache updates is an example of BE noncritical traffic. In this paper, we implement a novel biologically inspired fault-tolerant algorithm that provides both GT and BE QoS. …”
Get full text
Get full text
Article -
18
Stabilizing control of two-wheeled wheelchair with movable payload using optimized interval type-2 fuzzy logic
Published 2021“…The proposed wheelchair has been simulated using SimWise 4D software considering the most efficient parameters. These parameters are extracted using the spiral dynamic algorithm while being controlled with interval type-2 fuzzy logic controller (IT2FLC). …”
Get full text
Get full text
Get full text
Get full text
Article -
19
Optimization and prediction of battery electric vehicle driving range using adaptive fuzzy technique
Published 2022“…The study also developed an algorithm for predictive EMS using fuzzy model predictive control technique based on regression algorithm. …”
Get full text
Get full text
Thesis -
20
Efficient task scheduling strategies using symbiotic organisms search algorithm for cloud computing environment
Published 2022“…However, the efficiency of the clouds drops as the size of the search space gets larger, like in the case of most metaheuristic optimisation algorithms. …”
Get full text
Get full text
Thesis
