Search Results - (( java communication system algorithm ) OR ( program solution using algorithm ))
Search alternatives:
- java communication »
- system algorithm »
- using algorithm »
- solution using »
-
1
Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC
Published 2021“…A new multi-factor authentication scheme is designed using the AES-ECC algorithm based on Kerberos workflow to establish secure, efficient, and lightweight communication between the user and the targeted IIoT devices to avoid the issues. …”
Get full text
Get full text
Thesis -
2
Design of Improved Stream Cipher Algorithms for GSM Communication
Published 2024thesis::master thesis -
3
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
Get full text
Get full text
Conference or Workshop Item -
4
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014Get full text
Get full text
Undergraduates Project Papers -
5
Network game (Literati) / Chung Mei Kuen
Published 2003“…The possible applications of multimedia-networked system are endless, as the demand to support interactive communication among groups of users has increased significantly. …”
Get full text
Get full text
Thesis -
6
Parallel distributed genetic algorithm development based on microcontrollers framework
Published 2023Conference paper -
7
Overview of metaheuristic: classification of population and trajectory
Published 2010“…Algorithms are used to find the solutions through the computer program. …”
Get full text
Get full text
Monograph -
8
Algorithm As A Problem Solving Technique For Teaching And Learning Of The Malay Language
Published 2019“…The students were to arrange the basic words into grammatical sentences based on the scratch program and write a cake recipe using an algorithmic technique, a series of instructions contained in the scratch program. …”
Get full text
Get full text
Get full text
Article -
9
Algorithm as a problem solving technique for teaching and learning of the Malay language
Published 2019“…The students were to arrange the basic words into grammatical sentences based on the scratch program and write a cake recipe using an algorithmic technique, a series of instructions contained in the scratch program. …”
Get full text
Get full text
Get full text
Article -
10
Text messaging encryption system
Published 2012“…At present, banking,commerce and passwords can only be communicated with internet connection or as in person verbally or in written;Text Messaging Encryption system needs to overcome this intermediate subjects and deliver instructions or messages instantaneously and securely. …”
Get full text
Get full text
Undergraduates Project Papers -
11
A cluster-based hybrid replica control protocol for high availability in data grid
Published 2019“…The first issue is, nodes in the Grid systems are dynamic where they can join or leave the system at any time. …”
Get full text
Get full text
Thesis -
12
Comparison Between Linear Programming And Integer Linear Programming: A Review
Published 2018“…Heuristics are not guaranteed to obtain optimal solutions, compared to exact algorithms.…”
Get full text
Get full text
Get full text
Article -
13
Network monopoly / Tan Kean Yeap
Published 2002“…Accordingly, the pressure from the users of these systems for ways to communicate among all these machines is irresistible. …”
Get full text
Get full text
Thesis -
14
Solving transcendental equation using genetic algorithm / Masitah Hambari
Published 2004“…Genetic Algorithm is used to find the roots or set of optimal solution that satisfy the equation. …”
Get full text
Get full text
Thesis -
15
Optimal power flow based on fuzzy linear programming and modified Jaya algorithms
Published 2017“…For each considered case, results demonstrate that Jaya algorithm can produce a global optimum solution with rapid convergence. …”
Get full text
Get full text
Thesis -
16
Visdom: Smart guide robot for visually impaired people
Published 2025“…An Android mobile application, developed using Java and the java.net.Socket library, provides an intuitive and accessible user interface for seamless interaction with the robot. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
17
Securing cloud data system (SCDS) for key exposure using AES algorithm
Published 2021“…After that we use to build securing cloud data system (SCDS) for key exposure using the AES algorithm for encrypting and decrypting our website cloud data and files. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
18
Biometric identification with limited data set
Published 2019Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
19
Solving Sudoku puzzles in Binary Integer Linear Programming using Branch and Bound algorithm / Ahida Waliyyah Ahmad Fuad
Published 2024“…The puzzle starts with a partially filled grid provided by the setter, and it usually has a unique solution. This study explores the application of a Binary Integer Linear Programming (BILP) model combined with the Branch and Bound (B&B) algorithm to solve Sudoku puzzles. …”
Get full text
Get full text
Thesis -
20
Development of heuristic methods based on genetic algorithm (GA) for solving vehicle routing problem
Published 2008“…Genetic Algorithm gives a pool of solutions rather than just one. …”
Get full text
Get full text
Monograph
