Search Results - (( using codification based algorithm ) OR ( java communication research algorithm ))
Search alternatives:
- using codification »
- codification based »
- java communication »
- research algorithm »
-
1
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…Internet communication has become more common in this modern world recently, and one of the important algorithms used is ABS algorithm. …”
Get full text
Get full text
Undergraduates Project Papers -
2
Design of Improved Stream Cipher Algorithms for GSM Communication
Published 2024thesis::master thesis -
3
Network game (Literati) / Chung Mei Kuen
Published 2003“…It should be an interesting, time and value worth topic to research on. By using Java applet, it will give a good interactive response since it does not suffer from the delays or variability of bandwidth associated with network connection. …”
Get full text
Get full text
Thesis -
4
A cluster-based hybrid replica control protocol for high availability in data grid
Published 2019“…Another proposed algorithm is replica placement algorithm which selects and places only one replica in each cluster. …”
Get full text
Get full text
Thesis -
5
Text messaging encryption system
Published 2012“…The programming language that is used to write the program is Java Language.…”
Get full text
Get full text
Undergraduates Project Papers -
6
Securing cloud data system (SCDS) for key exposure using AES algorithm
Published 2021“…In our research project we use to build a local website using the NetBeans Java averments and create our database management by using MySQL language. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
-
8
Mathematical simulation for 3-dimensional temperature visualization on open source-based grid computing platform
Published 2009“…The development of this architecture is based on several programming language as it involves algorithm implementation on C, parallelization using Parallel Virtual Machine (PVM) and Java for web services development. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
9
Discriminative feature representation for Malay children’s speech recognition / Seyedmostafa Mirhassani
Published 2015“…Three speech databases were used for the experiments including prolonged Malay vowels and Malay continuous speech database based on children’s speech and TIMIT database based on adult speeches. …”
Get full text
Get full text
Thesis -
10
A multi-filter feature selection in detecting distributed denial-of-service attack
Published 2019Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
11
-
12
Mobile application for real time baby sign language recognition using YOLOv8 / Siti Aishah Idris and Ahmad Firdaus Ahmad Fadzil
Published 2024“…The model will be designed and developed using a deep learning algorithm, which is YOLOv8, the latest version of YOLO. …”
Get full text
Get full text
Get full text
Article -
13
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis
