Search Results - (( based generation force algorithm ) OR ( java application testing algorithm ))
Search alternatives:
- application testing »
- testing algorithm »
- based generation »
- generation force »
- java application »
- force algorithm »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
2
Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application
Published 2020“…Performance Testing is used to test the performance of algorithm implementations in applications. …”
Get full text
Get full text
Journal -
3
Key schedule algorithm based on coordinate geometry of a three-dimensional hybrid cube
Published 2019“…A key schedule algorithm is the mechanism that generates and schedules all session-keys for the encryption process. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
4
Key generation technique based on triangular coordinate extraction for hybrid cubes
Published 2017“…We proposed a new key generation technique based on TCE for the security of data. …”
Get full text
Get full text
Article -
5
Improved criteria determination of an automated negative lightning return strokes characterisation using Brute-Force search algorithm
Published 2021“…The criteria for each of the negative lightning return strokes parameters were established and defined based on specific mathematical equations. Accordingly, the proposed Brute-Force search algorithm characterised the negative lightning return strokes parameters based on the seven parameters. …”
Get full text
Get full text
Thesis -
6
Improving regenerative braking strategy using genetic algorithm for electric vehicles / H. Taleghani ... [et al.]
Published 2018“…The performance of the proposed regenerative braking control algorithm is evaluated by the ADVISOR which is based on MATLAB/Simulink environment. …”
Get full text
Get full text
Article -
7
-
8
HAPTIC VISUALIZATION USING VISUAL TEXTURE INFORMATION
Published 2011“…The design of the proposed framework involves haptic texture rendering algorithm and query algorithm. The proposed framework integrates computer haptic and content based image retrieval (CBIR) where haptic texture rendering is performed based on extracted cloth data. …”
Get full text
Get full text
Thesis -
9
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…The concept of ABS algorithm was firstly studied, including the definition, historical background, and a brief comparison was made between the ABS algorithm with other types of algorithm. …”
Get full text
Get full text
Undergraduates Project Papers -
10
Force and impedance control for hydraulically driven hexapod robot walking on uneven terrain
Published 2012“…For dynamic walking trajectory generation, the fixed/determined of tripod walking trajectory is modified with force threshold-based, named as environment trailed trajectory (ETT),on each first step of foot during support phase (preliminary sensing uneven terrain surfaces). …”
Get full text
Get full text
Thesis -
11
Classification System for Heart Disease Using Bayesian Classifier
Published 2007“…This system was developing base on to three main part which is data processing, testing and implementation of the algorithm. In this system a Bayesian algorithm was used in order to implement the system. …”
Get full text
Get full text
Thesis -
12
-
13
Two-axis position-based impedance control of a 2-DOF robotic finger / Khairunnisa Nasir
Published 2017“…The positionbased impedance control algorithm was designed by regulating the mechanical impedance of the robotic finger based on force measurements from the two embedded force sensors. …”
Get full text
Get full text
Thesis -
14
-
15
Dynamic key scheduling algorithm for block ciphers using quasigroup string transformation
Published 2018“…Key scheduling algorithm (KSA) is the mechanism that generates and schedules all sub-keys for each round of encryption. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
16
Development of control algorithm for a new 12s-6p single phase field excited flux switching motor
Published 2020“…In this research, two algorithms have been proposed in which first algorithm is based on bipolar DC signals while second algorithm is based on field oriented control (FOC) principle. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
17
Potential field methods and their inherent approaches for path planning
Published 2016“…Potential filed method is capable to overcome unknown scenario, taking into account the realities of the current environment of the robot motion. Two type of forces involved in potential field method; attractive force generated by goals and repulsive force generated by obstacles. …”
Get full text
Get full text
Article -
18
Regenerative braking strategy for electric vehicles using improved adaptive genetic algorithm
Published 2017“…The second strategy is based on Standard Genetic Algorithm (SGA). Lastly, the third strategy is utilizing Improved Adaptive Genetic Algorithm (IAGA). …”
Get full text
Get full text
Thesis -
19
Encrypted mobile messaging application using AES block cipher cryptography algorithm / Nur Rasyiqah Zulkifli
Published 2019“…The programming language that is used to write the program is Java Language that will run on android phones. As the result, this project was tested on the functionality of the mobile messaging application. …”
Get full text
Get full text
Student Project -
20
Design Of Robot Motion Planning Algorithm For Wall Following Robot
Published 2006Get full text
Get full text
Monograph
