Search Results - (( java application testing algorithm ) OR ( based reading process algorithm ))
Search alternatives:
- application testing »
- testing algorithm »
- process algorithm »
- java application »
- reading process »
- based reading »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
2
-
3
Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application
Published 2020“…Performance Testing is used to test the performance of algorithm implementations in applications. …”
Get full text
Get full text
Journal -
4
Missing tags detection algorithm for radio frequency identification (RFID) data stream
Published 2019“…In fact, the performance of RFID missing tag detection is largely affected by uncertainty, which should be considered in the detecting process phase to minimize its negative impact. Thus in this research, an AC complement algorithm with hashing algorithm and Detect False Negative Read algorithm (DFR) is used to developed the Missing Tags Detection Algorithm (MTDA). …”
Get full text
Get full text
Get full text
Get full text
Thesis -
5
Genetic algorithm optimized receiver-oriented packet clustering in multi-buffer network card
Published 2016“…In a network card, there is a packet clustering mechanism that if optimized, will increase the speed of packet reading/access at the application layer. This packet clustering optimization is an expansion of our previous base network card optimization in cloud network environment, using genetic algorithm. …”
Get full text
Get full text
Article -
6
-
7
Multiple case-based retrieval for university course timetabling problem
Published 2016“…The algorithm was running on timetabling tests, comparing to classic Case-based retrieval and Genetic Algorithm for a wider comparison. …”
Get full text
Get full text
Thesis -
8
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…The concept of ABS algorithm was firstly studied, including the definition, historical background, and a brief comparison was made between the ABS algorithm with other types of algorithm. …”
Get full text
Get full text
Undergraduates Project Papers -
9
Classification System for Heart Disease Using Bayesian Classifier
Published 2007“…This system was developing base on to three main part which is data processing, testing and implementation of the algorithm. In this system a Bayesian algorithm was used in order to implement the system. …”
Get full text
Get full text
Thesis -
10
Design of DNA fragment assembly using IWP method on application-specific integrated-circuit / Hasniliati Hassan
Published 2017“…Depending on the technology used, it can only read small pieces of base between 20 to 1000 bases. …”
Get full text
Get full text
Thesis -
11
-
12
-
13
Encrypted mobile messaging application using AES block cipher cryptography algorithm / Nur Rasyiqah Zulkifli
Published 2019“…The programming language that is used to write the program is Java Language that will run on android phones. As the result, this project was tested on the functionality of the mobile messaging application. …”
Get full text
Get full text
Student Project -
14
Design Of Robot Motion Planning Algorithm For Wall Following Robot
Published 2006Get full text
Get full text
Monograph -
15
Security Analysis Between Static And Dynamic S-boxes In Block Ciphers
Published 2024Get full text
Article -
16
-
17
-
18
An Effective Fast Searching Algorithm for Internet Crawling Usage
Published 2016“…The search algorithm is a crucial part in any internet applications. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
19
Development of Digital Image Processing Algorithms via FPGA Implementation
Published 2024“…FPGA-based digital image processing has become one of the choices for the public due to its parallel pipelining, which enables shorter processing time and better performance. …”
Get full text
Get full text
Get full text
Get full text
Article -
20
Holy Qur'an speech recognition system Imaalah checking rule for warsh recitation
Published 2017“…In the process of learning Quran, reciters should have the provisions of Tajweed rules when reading the Quran. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper
