Search Results - (( programming problem protocol algorithm ) OR ( java application matching algorithm ))
Search alternatives:
- application matching »
- protocol algorithm »
- problem protocol »
- java application »
-
1
-
2
Implementing Station-to-Station protocol using Multi Prime RSA Cryptosystem / Muhammad Arif Musa Abdullah
Published 2023“…The result will also produce the algorithm for implementing Multi Prime RSA cryptosystem into Station-to-Station protocol. …”
Get full text
Get full text
Student Project -
3
Enhancing problem-solving skills of novice programmers in an introductory programming course
Published 2023“…Internet protocols; Learning algorithms; Learning systems; Semantics; Teaching; Introductory programming; Introductory programming course; Problem solving skills; Programming exercise; Programming knowledge; Semi structured interviews; Students' behaviors; Traditional approaches; Students…”
Article -
4
New synchronization protocol for distributed system with TCP extension
Published 2013“…Process management is a fundamental problem in distributed systems. It is fast becoming a major performance and design issue for concurrent programming on modern architectures and for the design of distributed systems. …”
Get full text
Get full text
Thesis -
5
-
6
A platform to develop a secure instant messaging using jabber protocol
Published 2010Get full text
Article -
7
-
8
-
9
-
10
Video traffic analysis on Unifi broadband network / Laina Sofia Mahamad
Published 2017“…Results presents four top traffic protocols are identified which are Transmission Control Protocol (TCP), User Datagram Protocol (UDP) and Quick UDP Internet Connection (QUIC) protocol when streaming the videos in UNIFI network. …”
Get full text
Get full text
Thesis -
11
Message based random variable length key encryption algorithm.
Published 2009Get full text
Get full text
Article -
12
Securing cloud data system (SCDS) for key exposure using AES algorithm
Published 2021“…The AES algorithm has its own structure to encrypt and decrypt sensitive data that make the attackers difficult to get the real data when encrypting by AES algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
13
-
14
Security Framework Based on Reputation Mechanism for Peer-To-Peer Systems
Published 2004“…This approach nicely complements the existing peer-to-peer protocols and gives a limited disruption on current implementations. …”
Get full text
Get full text
Thesis -
15
Integration Of Machine Vision In Industrial Robot For Automated Composite Panel Punching
Published 2018“…Secondly, the current KUKA Robot Controller (KRC) 4 does not have the capability to communicate with an external device due to the controller safety protocol. The aim of this research is to build a machine vision algorithm for assisting KUKA robot in recognizing and calibrating various shapes of composite panels precisely. …”
Get full text
Get full text
Thesis -
16
-
17
An Agent-Based System with Personalization and Intelligent Assistance Services for Facilitating Knowledge Sharing
Published 2006“…The main algorithms used are profile determination and user similarity. …”
Get full text
Get full text
Thesis
