Search Results - (( network implementation method algorithm ) OR ( java application a algorithm ))
Search alternatives:
- network implementation »
- implementation method »
- method algorithm »
- java application »
- application a »
- a algorithm »
-
1
Route Optimization System
Published 2005“…This algorithm is an exact algorithm that is specifically for finding the shortest route in a network. …”
Get full text
Get full text
Final Year Project -
2
Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework
Published 2004“…The work presented in this thesis discusses the problems of real-time audio streaming and investigates solutions for improving the audio data transmitting over the network.To achieve audio media data transmitting over the network in an efficient manner (realtime), the following issues: Initial delay of playing time (downloading time); current streaming protocols which can not cope well with network congestion; compression algorithms efficiency; network bandwidth utilization (network infrastructure); and security concerns of content owners, need to be considered.In this thesis, the implementation method of a real-time audio streaming service system is discussed. …”
Get full text
Get full text
Thesis -
3
Network game (Literati) / Chung Mei Kuen
Published 2003“…The algorithm design and implementation method must not only be workable, but also highly efficient in terms of execution speed and response time. …”
Get full text
Get full text
Thesis -
4
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
Get full text
Get full text
Thesis -
5
Biometrics electronic purse
Published 1999“…SET) to provide secure transactions over a distributed network. A simple PIN code verlfication is no longer suflcient and would require a more complex and fools proof authentication method. …”
Get full text
Get full text
Get full text
Proceeding Paper -
6
Web-based expert system for material selection of natural fiber- reinforced polymer composites
Published 2015“…An inappropriate selection of materials for engineering component would result in entire product failure which ultimately has a negative impact on the society. Several algorithms, methods and spreadsheets are being proposed by various researchers in this field to improve materials selection. …”
Get full text
Get full text
Thesis -
7
Network monopoly / Tan Kean Yeap
Published 2002“…The algorithm design and implementation method mustnot only be workable, but also highly efficient in terms of execution speed and respond time. …”
Get full text
Get full text
Thesis -
8
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We also introduce a dynamic analysis method, AndroPsychology, in order to analyse the network communications of Android applications. …”
Get full text
Get full text
Get full text
Thesis -
9
-
10
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…Consequently,the implementation of this technique will be applicable to enterprise application such as bank, insurance, group of companies as well as a small and medium organization such as NGO. …”
Get full text
Get full text
Thesis -
11
Network reconfiguration and control for loss reduction using genetic algorithm
Published 2010“…Two selection methods that are used in Genetic Algorithm are the roulette wheel and tournament selections. …”
Get full text
Get full text
Thesis -
12
Security mechanism for wireless Mobile Ad Hoc Networks (MANET)
Published 2006“…The One Time Pad algorithm and Caesar Cipher algorithms are implemented using LabVIEW software. …”
Get full text
Get full text
Student Project -
13
-
14
RSA Encryption & Decryption using JAVA
Published 2006“…The key is the trigger mechanism to the algorithm. Until the advent of the Internet, encryption was rarely used by the public, but was largely a military tool. …”
Get full text
Get full text
Final Year Project -
15
-
16
Workability review of genetic algorithm approach in networks
Published 2014“…In this paper, we surveyed the implementations of genetic algorithm within networks, whether it is computer network, transportation network, and other fields that have networking context. …”
Get full text
Get full text
Conference or Workshop Item -
17
SINE COSINE ALGORITHM BASED NEURAL NETWORK FOR RAINFALL DATA IMPUTATION
Published 2024“…These findings revealed the superior performance of the SCANN imputation method compared to the feedforward neural network (FFNN) method, indicating its suitability for efficiently filling missing values in the rainfall database.…”
Get full text
Get full text
Get full text
Book Chapter -
18
An efficient algorithm for cardiac arrhythmia classification using ensemble of depthwise Separable convolutional neural networks
Published 2020“…Moreover, to reduce the computational cost while maintaining its accuracy, several techniques were implemented, including All Convolutional Network (ACN), Batch Normalization (BN), and ensemble convolutional neural networks. …”
Get full text
Get full text
Get full text
Get full text
Article -
19
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
20
