Search Results - (( developing file using algorithm ) OR ( java application testing algorithm ))
Search alternatives:
- application testing »
- testing algorithm »
- java application »
- developing file »
- using algorithm »
- file using »
-
1
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…The aim of the thesis is to provide an overview of the ABS encryptiOn algorithm, to develop a prototype that is implemented for communication purpose, and to test the developed prototype in terms of accuracy purpose. …”
Get full text
Get full text
Undergraduates Project Papers -
2
An Effective Fast Searching Algorithm for Internet Crawling Usage
Published 2016“…The search algorithm is a crucial part in any internet applications. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
3
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
4
Keyword indexing for text documents using signature files / Abdul Hakim A. Gafa
Published 2008“…The main of this project is to compare the effectiveness of searching Text documents between using Signature files algorithm and Inverted files algorithm. …”
Get full text
Get full text
Thesis -
5
A Comparative Study on Compression of Different Image File Formats
Published 1999“…Some of the experiment was done twice with two different types of images to ensure that the results were accurate. The Algorithms used to compress and decompress the image ware Run Length Encoding (RLE) algorithm and Lampel-ziv and Welch (LZW) algorithm. …”
Get full text
Get full text
Thesis -
6
E-Raser: file shredder application with content replacement by using random words function
Published 2018“…Thus, this study proposed a file shredding application named E-Raser which replacing the content of the file using random words function algorithm. …”
Get full text
Get full text
Get full text
Article -
7
Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application
Published 2020“…Performance Testing is used to test the performance of algorithm implementations in applications. …”
Get full text
Get full text
Journal -
8
Development of the Multipurpose Integrated Multimedia Presentation System Based on the CCM Algorithm
Published 2010“…human’s life sectors. People use many file types of each multimedia element such as file type of videos, audios, images,graphs, animations, texts and also live video streaming. …”
Get full text
Get full text
Conference or Workshop Item -
9
Automatic generation of user-defined test algorithm description file for memory BIST implementation
Published 2022“…It can be used by implementing a standard testing algorithm available in the EDA tool library or a user-defined algorithm (UDA). …”
Get full text
Get full text
Get full text
Article -
10
Secure mobile AES encryptor (SMAE)
Published 2016“…The purpose of this project is to identify a way to develop a mobile web application for the encryption and decryption of files using the 256 –bit Advanced Encryption Standard (AES) encryption algorithm. …”
Get full text
Get full text
Undergraduates Project Papers -
11
-
12
-
13
Dynamic replication algorithm in data grid: Survey
Published 2008Get full text
Get full text
Get full text
Book Section -
14
Development of Digital Image Processing Algorithms via FPGA Implementation
Published 2024“…They are the most popular algorithms used in digital image processing. Microsoft Paint is used to convert the format of the color input image to bitmap format, followed by MATLAB to convert it into a hexadecimal file to be read and written in FPGA. …”
Get full text
Get full text
Get full text
Get full text
Article -
15
Detecting JFIF header using FORHEADER
Published 2011“…Foremost, Scalpel; however the algorithm used for header detection is not much discussed. …”
Get full text
Get full text
Get full text
Article -
16
The development of semantic meta-database: an ontology based semantic integration of biological databases
Published 2007“…The tool comprises two intelligent algorithms. The first algorithm combines parallel genetic algorithm with the split-and-merge algorithm. …”
Get full text
Get full text
Monograph -
17
Statistical fixed range multiple selection algorithm for peer-to-peer system
Published 2010“…The algorithm uses a fixed filter range approach that has been defined before the process begin, in which the algorithm is able to make sure that the target key is within the specified filter range in each local file. …”
Get full text
Get full text
Conference or Workshop Item -
18
Static range multiple selection algorithm for peer-to-peer system
Published 2011“…The algorithm uses a fixed filter approach in which the algorithm is able to make sure that the target key is within certain filter range in each local file. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
19
On the Identification of FOSD-based Non-zero Onset Speech Dataset
Published 2020“…In order to develop such TTS or STT engines, text and the corresponding recorded speech in an audio file used for training, validating and testing must be aligned. …”
Get full text
Get full text
Conference or Workshop Item -
20
