Search Results - (( program computing knowing algorithm ) OR ( java application designing algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
    Get full text
    Get full text
    Final Year Project
  2. 2
  3. 3

    Agent-based extraction algorithm for computational problem solving by Rajabi, Maryam

    Published 2015
    “…Modeling Computational Problem Solving (CPS) is the main issue in teaching programming where the given text is needed to be transformed into a model then later into a programming language. …”
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5
  6. 6

    A preliminary study of difficulties in learning java programming for secondary school by Majalin, M., Aslina Baharum, Ismail, R., Ismail, I., Ervin Gubin Moung, Noor, N.A.M.

    Published 2020
    “…One of the problems is students have difficulty in certain subtopics of programming. Coding to a specific task by using much complex algorithm is not an easy task as student needs to understand and know how to use it to solve a problem. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework by Asaad Aref, Ibrahim

    Published 2004
    “…Java Media Framework library and the RTP protocol for audio transmission were used as development tools.The developed system designed in this thesis together with experimental results proved that the system could be implemented successfully. …”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9
  10. 10
  11. 11
  12. 12

    Botnet detection using automated script / Norfathin Rosli by Rosli, Norfathin

    Published 2020
    “…Nowadays, as we know the virus or malware spread can be so fast and usually hard to detect. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Text messaging encryption system by Sundara Morthty, Nirmala Devi

    Published 2012
    “…The only way to read the information is to know the method on how message is being masked,in this case knowing the algorithm used to encrypt the message. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  14. 14
  15. 15
  16. 16
  17. 17
  18. 18

    Network game (Literati) / Chung Mei Kuen by Chung, Mei Kuen

    Published 2003
    “…The main aspect of this thesis is to produce a networked gaming system, which process players. requested to play the game and enabling users to play the graphical game with people through the network. The algorithm design and implementation method must not only be workable, but also highly efficient in terms of execution speed and response time. …”
    Get full text
    Get full text
    Thesis
  19. 19

    SANAsms: Secure short messaging system for secure GSM mobile communication by Anuar, N.B., Azlan, I.M., Wahid, A.W.A., Zakaria, O.

    Published 2008
    “…The application is designed to satisfy the user friendly interfaces and intent to be used by the end user without having the advanced knowledge in mobile security. …”
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20