Search Results - (( java applications mobile algorithm ) OR ( parallel validation using algorithm ))

Refine Results
  1. 1
  2. 2

    SANAsms: Secure short messaging system for secure GSM mobile communication by Anuar, N.B., Azlan, I.M., Wahid, A.W.A., Zakaria, O.

    Published 2008
    “…Besides, mobile phone that able to run J2ME application is being chosen because it was designed specifically for mobile devices which support small memory footprint and low power consumption.…”
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    Encrypted mobile messaging application using AES block cipher cryptography algorithm / Nur Rasyiqah Zulkifli by Zulkifli, Nur Rasyiqah

    Published 2019
    “…Nowadays, people mostly use mobile application to communicate with each other. …”
    Get full text
    Get full text
    Student Project
  4. 4

    Smart appointment organizer for mobile application / Mohd Syafiq Adam by Adam, Mohd Syafiq

    Published 2009
    “…In creating this application, NetBeans IDE 6.5and Java Micro Edition (Java ME) are used. …”
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6
  7. 7

    Route Optimization System by Zulkifli, Abdul Hayy

    Published 2005
    “…The potential for this project to be propagated on a mobile platform can also be considered due to its Java platform.…”
    Get full text
    Get full text
    Final Year Project
  8. 8

    Parallel block backward differentiation formulas for solving large systems of ordinary differential equations. by Ibrahim, Zarina Bibi, Othman, Khairil Iskandar

    Published 2010
    “…Parallelism is obtained by using Message Passing Interface (MPI).Numerical results are given to validate the efficiency of the PBBDF implementation as compared to the sequential implementation.…”
    Get full text
    Get full text
    Article
  9. 9
  10. 10

    Harmonic reduction in three-phase parallel connected inverter by Younis, M.A.A., Rahim, N.A., Mekhilef, Saad

    Published 2009
    “…High frequency third harmonic injection PWM (THIPWM) employed to reduce the total harmonic distortion and to make maximum use of the voltage source. DSP was used to generate the THIPWM and the control algorithm for the converter. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    The Parallel Fuzzy C-Median Clustering Algorithm Using Spark for the Big Data by Mallik, Moksud Alam, Zulkurnain, Nurul Fariza, Siddiqui, Sumrana, Sarkar, Rashel

    Published 2024
    “…Therefore, we develop a Parallel Fuzzy C-Median Clustering Algorithm Using Spark for Big Data that can handle large datasets while maintaining high accuracy and scalability. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Distributed generation with parallel connected inverter by Younis, U.A.A., Rahirn, N.A., Mekhilef, Saad

    Published 2009
    “…Third harmonic injection PWM (THIPWM) reduces the total harmonic distortion and to make maximum use of the voltage source. DSP was used to generate the THIPWM and the control algorithm for the converter. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    Parallel connected inverter for fuel cell system by Younis, M.A.A., Rahim, N.A., Mekhilef, Saad

    Published 2008
    “…Third harmonic injection PWM (THIPWM) reduces the total harmonic distortion and to make maximum use of the voltage source. DSP was used to create the THIPWM and the control algorithm for the converter. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14

    Visdom: Smart guide robot for visually impaired people by Lee, Zhen Ting

    Published 2025
    “…The system architecture integrates ROS 2 on a Raspberry Pi, with TCP/IP connectivity enabling remote operation. An Android mobile application, developed using Java and the java.net.Socket library, provides an intuitive and accessible user interface for seamless interaction with the robot. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  15. 15

    Development of an automatics parallel parking system for nonholonomic mobile robot by Mohd Fairuz , Abdollah, Syed Najib , Syed Salim, Irma Wani , Jamaludin, Muhammad Nizam , Kamarudin

    Published 2011
    “…Experimental results are presented to demonstrate and validate effectiveness of the technique used.…”
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16
  17. 17

    Computer remote monitoring via mobile phones using socket programming / Samih Omer Fadlelmola Elkhider by Omer Fadlelmola Elkhider, Samih

    Published 2011
    “…Such methodology can be achieved by java programming language for mobile clients J2ME, and by using a second generation mobile phones. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Accelerating DNA sequence alignment based on smith waterman algorithm using recursive variable expansion / Muhamad Faiz Ismail by Ismail, Muhamad Faiz

    Published 2014
    “…We generalize the approach by proposing a framework such that the technique can be applied to a large range of DP problems. Finally, we validate the proposed DP framework using the Smith-Waterman (SW) algorithm, which is a widely used, computation and data intensive application in bioinformatics. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Network game (Literati) / Chung Mei Kuen by Chung, Mei Kuen

    Published 2003
    “…Therefore, efficient and robust servers that process separate client connections in separate threads are needed. Java applet is a well-known and widely used example of mobile code (a variation on the traditional client-server model). …”
    Get full text
    Get full text
    Thesis
  20. 20

    Talkout : Protecting mental health application with a lightweight message encryption by Gavin Teo Juen

    Published 2022
    “…However, the increased security breaches of recent mental health applications that leaked the patient's profile. This project proposed a virtual mental health mobile application, called TalkOut, with a lightweight message encryption algorithm to protect patient's profile, conversation messages and treatment history. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise