Search Results - (( java application testing algorithm ) OR ( software information modeling algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application by Yana Aditia, Gerhana, Nur, Lukman, Arief Fatchul, Huda, Cecep Nurul, Alam, Undang, Syaripudin, Devi, Novitasari

    Published 2020
    “…Performance Testing is used to test the performance of algorithm implementations in applications. …”
    Get full text
    Get full text
    Journal
  3. 3

    DESIGN AND IMPLEMENTATION OF RIPEMD-160 ALGORITHM ON RECONFIGURABLE HARDWARE by FLORISCA, ALDINA GODULUS

    Published 2019
    “…It is implemented using Verilog HDL software and simulated using the ModelSim software. …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  4. 4

    An Algorithmic Approach for Stability of an Autonomous System by Cik Soh, Shaharuddin

    Published 2002
    “…Trajectory of the system is plotted in the phase plane. To develop the software we use the C programming language. It is hoped that the software developed will be of help to researchers in the field of mathematical biology to understand the concept of stability in their model.…”
    Get full text
    Get full text
    Thesis
  5. 5

    Effort Estimation Model for Function Point Measurement by Koh, Tieng Wei

    Published 2007
    “…Various cost estimation models and methods are available to be used for software development process. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    Symmetric Key Size for Different Level of Information Classification by Ibrahim, Subariah, Maarof, Mohd. Aizaini

    Published 2006
    “…Our proposed model includes a lifespan of information to be encrypted. …”
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    Modified key size determination models for symmetric ciphers by Ibrahim, Subariah, Maarof, Mohd. Aizaini

    Published 2005
    “…However our second model shows that AES is not adequate to protect very long term information…”
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9
  10. 10
  11. 11

    Algorithm-program visualization model : An intergrated software visualzation to support novices' programming comprehension by Affandy

    Published 2015
    “…This model is then to be used in the prototype tool development that is called 3De-ALPROV (Design Development Debug – Algorithm Program Visualization). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    Implementation of (AES) Advanced Encryption Standard algorithm in communication application by Moh, Heng Huong

    Published 2014
    “…The concept of ABS algorithm was firstly studied, including the definition, historical background, and a brief comparison was made between the ABS algorithm with other types of algorithm. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  13. 13
  14. 14

    Classification System for Heart Disease Using Bayesian Classifier by Magendram, Anusha

    Published 2007
    “…This system was developing base on to three main part which is data processing, testing and implementation of the algorithm. In this system a Bayesian algorithm was used in order to implement the system. …”
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16

    General purpose search and classification algorithms for distributed information access by Siraj, Fadzilah, Wan Ishak, Wan Hussain

    Published 2000
    “…These information need to be organized so that users can access and search the information in the convenient way. …”
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17
  18. 18
  19. 19
  20. 20