Search Results - (( java application service algorithm ) OR ( using interactive protocol algorithm ))
Search alternatives:
- interactive protocol »
- application service »
- protocol algorithm »
- service algorithm »
- java application »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
2
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
3
Deniable authentication protocol based on factoring and discrete logarithm problems
Published 2022“…In terms of communication overhead, the non-interactive protocol is more effective than the interactive protocol. …”
Get full text
Get full text
Conference or Workshop Item -
4
Performance analysis of multipath routing based on source routing
Published 2010Get full text
Working Paper -
5
Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework
Published 2004“…A design proposal was outlined to provide an adaptive client/server approach to stream audio contents using Real-Time Transport Protocol (RTP) involving architecture based on the Java Media Framework (JMF) Application Programmable Interfaces (API).RTP protocol is the Internet-standard protocol for the transport of real-time data, including audio and video and can be implemented by using Java Media Framework (JMF). …”
Get full text
Get full text
Thesis -
6
Vehicular ad-hoc network (vanets) for electrical vehicle charging management
Published 2025text::Thesis -
7
Quality of service performances of three mobile ad hoc network protocols
Published 2009“…The thesis proposed to evaluate the Quality of Service (QoS) performances of three types MANET protocols. The protocols included the Dynamic Source Routing (DSR), Ad Hoc On-demand Distance Vector (AODV) and Temporally Ordered Routing Algorithm (TORA) protocol. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
8
Mathematical simulation for 3-dimensional temperature visualization on open source-based grid computing platform
Published 2009“…The development of this architecture is based on several programming language as it involves algorithm implementation on C, parallelization using Parallel Virtual Machine (PVM) and Java for web services development. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
9
Enhancement of Security Architecture for Smartcard Based Authentication Protocols
Published 2004“…In particular, important issues such as how smartcard applications can be modeled using UML techniques and how UML can be used to sketch the operations for implementing a secure access using smartcard has been addressed.…”
Get full text
Get full text
Thesis -
10
Talkout : Protecting mental health application with a lightweight message encryption
Published 2022“…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
Get full text
Get full text
Get full text
Academic Exercise -
11
Multipath routing protocol based on cross-layer approach for MANET
Published 2017“…In an effort to improve the performance of MANETs, there has been increased in protocols that rely on cross-layer interaction between different layers. …”
Get full text
Get full text
Get full text
Article -
12
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…A GUI is created in a form of JAVA application to display data detected from tag. …”
Get full text
Get full text
Thesis -
13
-
14
-
15
A comprehensive analysis of surface electromyography for control of lower limb exoskeleton
Published 2016“…The RMSE for both protocols were relatively low varying between 6.88 and 8.31. …”
Get full text
Get full text
Thesis -
16
IMPROVING QoS OF VoWLAN VIA CROSS-LAYER BASED ADAPTIVE APPROACH
Published 2013“…Voice over Internet Protocol (VoIP) is a technology that allows the transmission of voice packets over Internet Protocol (IP). …”
Get full text
Get full text
Thesis -
17
A review energy-efficient task scheduling algorithms in cloud computing
Published 2023Conference Paper -
18
Automated bilateral negotiation with incomplete information in the e-marketplace.
Published 2011“…In addition, the well-known alternating-offers protocol is used to govern the interactions. To generate Pareto-optimal offer with one-side incomplete information, at first,an algorithm is presented to generate multi-issue offers with perfect (complete)information. …”
Get full text
Get full text
Thesis -
19
Implementation of RIO in UMJaNetSim / Chan Chin We
Published 2004Get full text
Get full text
Thesis -
20
Energy efficient cluster head distribution in wireless sensor networks
Published 2013“…PSO is lightweight heuristic optimization algorithm with each CH will move towards the best solutions by individual interaction with one another while learning from their own experience. …”
Get full text
Get full text
Get full text
Thesis
