Search Results - (( java application testing algorithm ) OR ( network implementation 5s algorithm ))
Search alternatives:
- network implementation »
- application testing »
- testing algorithm »
- implementation 5s »
- java application »
- 5s algorithm »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
2
Adaptive routing algorithms and implementation for TESH network
Published 2013Get full text
Get full text
Get full text
Article -
3
A hybrid algorithm for finding shortest path in network routing.
Published 2009Get full text
Article -
4
-
5
Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application
Published 2020“…Performance Testing is used to test the performance of algorithm implementations in applications. …”
Get full text
Get full text
Journal -
6
-
7
-
8
Traffic management algorithms for LEO satellite networks
Published 2016“…In order to evaluate the proposed algorithm, a series of experiments to implement Discrete Event Simulation (DES) of a LEO satellite network by using ns-2 and C/C++ are conducted. …”
Get full text
Get full text
Get full text
Thesis -
9
Neural Network Based Pattern Recognition in Visual Inspection System for Intergrated Circuit Mark Inspection
Published 1998“…A neural network based pattern recognition system was implemented and tested on images resembling the parts variations. …”
Get full text
Get full text
Thesis -
10
-
11
Performance comparison encryption of IPSEC VPN encryption techniques / Nur Hasyimah Mohd Ridzuan
Published 2015“…This paper presents the implementation of site to site VPN tunneling using a network simulator. …”
Get full text
Get full text
Thesis -
12
Workability review of genetic algorithm approach in networks
Published 2014Get full text
Get full text
Conference or Workshop Item -
13
Performance comparison of encryption IPsec VPN encryption techniques / Nur Hasyimah Mohd Ridzuan and Ruhani Ab Rahman
“…This paper presents the implementation of site to site VPN tunneling using a network simulator. …”
Get full text
Get full text
Article -
14
A study of an efficient scheduling algorithm for simultaneous 5G multimedia Traffic
Published 2022“…Therefore, network operators need to decide on which metric to be optimized when choosing a packet scheduling algorithm to be implemented in their networks.…”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
15
-
16
-
17
QoS routing for multiple additive QoS parameters using genetic algorithm
Published 2023“…The algorithm was implemented and tested on a 5�5 mesh network to test for its effectiveness. …”
Conference paper -
18
Memory efficient BFGS neural-network learning algorithms using MLP-network: a survey
Published 2004Get full text
Get full text
Conference or Workshop Item -
19
An implementation of open systems interconnection (OSI) transport layer P2P identification algorithm using Netflow and Netfilter as a P2P traffic firewall / Amir Herman Amiruddin
Published 2014“…The ability of detecting P2P host by this algorithm was compared to the detection rate of operational DPI appliances in the network. …”
Get full text
Get full text
Thesis -
20
Distributive and self-sustainable scheduling algorithm for wireless sensor networks
Published 2013Get full text
Get full text
Conference or Workshop Item
