Search Results - (( data virtualization research algorithm ) OR ( java application testing algorithm ))
Search alternatives:
- data virtualization »
- application testing »
- research algorithm »
- testing algorithm »
- java application »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
2
Energy-efficient algorithms for dynamic virtual machine consolidation in cloud data centers
Published 2017“…In this paper, several novel algorithms are proposed for the dynamic consolidation of VMs in cloud data centers. …”
Get full text
Get full text
Get full text
Article -
3
Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application
Published 2020“…Performance Testing is used to test the performance of algorithm implementations in applications. …”
Get full text
Get full text
Journal -
4
Performance analysis of constrained device virtualization algorithm
Published 2020“…We have adopted this technique in our research to virtualize the entire Internet of Things network so that virtual TCP/IP based protocols can operate on virtual networks for enabling interoperability. …”
Get full text
Get full text
Get full text
Article -
5
An augmented reality real-time cloud-based remote monitoring algorithm for a manufacturing system / Siti Aisyah Jaafar
Published 2021“…This goes to the second objective of this research, in which to apply the algorithm to an App called “AR-Simulasi”, where it will be used to monitor the conveyor system. …”
Get full text
Get full text
Thesis -
6
-
7
-
8
Virtual reality in algorithm programming course: practicality and implications for college students
Published 2024“…The reliability of VR supports various variations in learning, including learning programming algorithms. This research aims to design and develop VR in learning programming algorithms. …”
Get full text
Get full text
Get full text
Article -
9
-
10
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…The concept of ABS algorithm was firstly studied, including the definition, historical background, and a brief comparison was made between the ABS algorithm with other types of algorithm. …”
Get full text
Get full text
Undergraduates Project Papers -
11
Finger triggered virtual musical instruments
Published 2013Get full text
Get full text
Get full text
Article -
12
Classification System for Heart Disease Using Bayesian Classifier
Published 2007“…This system was developing base on to three main part which is data processing, testing and implementation of the algorithm. In this system a Bayesian algorithm was used in order to implement the system. …”
Get full text
Get full text
Thesis -
13
-
14
-
15
-
16
"Application of Neural Network in developing Virtual Analyzer of Reformate Research Octane Number"
Published 2005“…The interest of this Final Year Research Project covers the topic of Application of Artificial Neural Networks for developing virtual analyzer for petroleum quality, Research Octane Number. …”
Get full text
Get full text
Final Year Project -
17
Encrypted mobile messaging application using AES block cipher cryptography algorithm / Nur Rasyiqah Zulkifli
Published 2019“…The programming language that is used to write the program is Java Language that will run on android phones. As the result, this project was tested on the functionality of the mobile messaging application. …”
Get full text
Get full text
Student Project -
18
Design Of Robot Motion Planning Algorithm For Wall Following Robot
Published 2006Get full text
Get full text
Monograph -
19
Energy and performance efficient resource allocation for cloud-based data centers
Published 2015“…Recently,researchers have shown an increased interest to reduce energy consumption in cloud data centers by consolidation of Virtual Machines. …”
Get full text
Get full text
Thesis -
20
Security Analysis Between Static And Dynamic S-boxes In Block Ciphers
Published 2024Get full text
Article
