Search Results - (( java implementation during algorithm ) OR ( using practical protocol algorithm ))

Refine Results
  1. 1

    Pairwise testing tools based on hill climbing algorithm (PTCA) by Lim, Seng Kee

    Published 2014
    “…The actual implementation of the algorithm which is in Java programming language, the program is implemented on Net Bean 7.0.1. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  2. 2

    Routine insulin sliding scale protocol versus software driven algorithm (star protocol) for blood glucose management of critically ill patients in the ICU: A prospective observatio... by Tan, Ru Yi

    Published 2018
    “…Hence, further work and research in the area of software development and customisation to local epidemiology is required to validate it for use in our clinical practice.…”
    Get full text
    Get full text
    Thesis
  3. 3

    Performance enhancement of adaptive cluster formation and routing protocols in wireless networks by Khalaf, Osamah Ibrahem

    Published 2017
    “…EBCRA solves the issue of redundant re-transmission of RREQ packet and propose a routing algorithm that deal with the broadcast storm problem which is widely practiced in MANET routing protocol. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5

    Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization by Mohammad Ata, Karimeh Ibrahim

    Published 2019
    “…The circuits have been designed by proteus, the microcontrollers have been programmed by micro C, and the Graphical User Interface (GUI) has been implemented in Java. Few by electronic components such as RFID, multiplexer, XBee, and servo motors have been used to realize the system. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7
  8. 8

    Enhancement of Security Architecture for Smartcard Based Authentication Protocols by Mohammed, Lawan Ahmed

    Published 2004
    “…In particular, important issues such as how smartcard applications can be modeled using UML techniques and how UML can be used to sketch the operations for implementing a secure access using smartcard has been addressed.…”
    Get full text
    Get full text
    Thesis
  9. 9

    A protocol for developing a classification system of mosquitoes using transfer learning by Pradeep Isawasan, Zetty Ilham Abdullah, Ong, Song Quan, Khairulliza Ahmad Salleh

    Published 2022
    “…This protocol target on the domain expert such as entomologist and public health practices to develop their own model to solve the task of mosquito/insect classification.…”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Optimal forwarding routing protocol in ipv6-based wireless sensor network by Jamil, Ansar

    Published 2009
    “…In WSNs, TinyOS is the most widely used operating system. Thus, programming code of the OF routing protocol algorithm is written using NesC language, which is a high level programming language that emulates the syntax and functionality of hardware description languages, and provides components for communication, thread coordination, and hardware abstraction. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Talkout : Protecting mental health application with a lightweight message encryption by Gavin Teo Juen

    Published 2022
    “…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  12. 12

    Genetic Algorithm based Chain Leader Election in Wireless Sensor Network for Precision Farming by Hamzarul Alif Hamzah, Norah Tuah, Lim, Kit Guan, Tan, Min Keng, Ismail Saad, Tze, Kenneth,Kin Teo

    Published 2020
    “…The energy management issue in WSN has gained attention of scholars, leading to new protocols or schemes developed over the years. Conventionally, PEGASIS protocol selects chain leader without considering the distance and residual energy level of each sensor node. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    Design & Development of a Robotic System Using LEGO Mindstorm by Abd Manap, Nurulfajar, Md Salim, Sani Irwan, Haron, Nor Zaidi

    Published 2006
    “…The system is capable in operating an off-line programming method, starting from its programming sequences until robotic implementation of the program. During early stages, the research is emphasis more towards designing a robotic system using RoboLab software and C++ programming language. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14

    Data Hiding Techniques In Digital Images by Al Thloothi, Salah Ramadan

    Published 2003
    “…After all these studies, one of the algorithms in the masking technique is developed and implemented using JAVA program to embed message into true color image with a good quality and higher capacity. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Multi-floor indoor location estimation system based on wireless local area network by Chua, Tien Han

    Published 2007
    “…Before developing the system, study on characteristics of RSS is conducted to help the design, development and implementation of the proposed system. The proposed system is then designed and developed using Java programming language. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Efficient data delivery in dense reader environment of passive sensor network by Nawaz, F., Jeoti, V.

    Published 2020
    “…GREEN protocol even works in DRE producing high packet transmission percentage because the protocol arrangement is used with the network coding and retransmission request capabilities. …”
    Get full text
    Get full text
    Article
  17. 17

    Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system by Beg, Abul Hashem

    Published 2011
    “…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19

    On the sequences ri, si, ti ∈ ℤ related to extended Euclidean algorithm and continued fractions by Muhammad, Khairun Nisak, Kamarulhaili, Hailiza

    Published 2016
    “…The extended Euclidean Algorithm is a practical technique used in many cryptographic applications, where it computes the sequences ri, si, ti ∈ ℤ that always satisfy ri = si a+ tib. …”
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20

    Impact of BPL penalty functions and PSF models in PET/CT radial spatial resolution recovery by Si, Wang Jie

    Published 2024
    “…Since National Cancer Institute (NCI) currently practice OSEM+TOF+PSF+BPL (β 450) as the in-house protocol, this study explores alternative BPL and PSF functions in OSEM to enhance spatial resolution and determine optimal β values for NCI's routine clinical use. …”
    Get full text
    Get full text
    Monograph