Search Results - (( program case verification algorithm ) OR ( java application testing algorithm ))
Search alternatives:
- verification algorithm »
- application testing »
- case verification »
- testing algorithm »
- java application »
- program case »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
2
Augmentation of basic-line-search and quick-simplex-method algorithms to enhance linear programming computational performance
Published 2021“…Finally, mathematical experimentation is proceeded concerning on verification and validation of the new algorithm. The verification performed through generated random problems via MATLAB has shown the new augmentation algorithm maintains to generate a lesser iteration number from the highest percentage of nonzero coefficients in constraints matrix (80%) and the biggest problem sizes (m = 100, n = 100) until to the lowest percentage of nonzero coefficients in constraints matrix (20%) and the smallest problem sizes (m = 5, n = 5). …”
Get full text
Get full text
Get full text
Thesis -
3
Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application
Published 2020“…Performance Testing is used to test the performance of algorithm implementations in applications. …”
Get full text
Get full text
Journal -
4
Case driven TLC model checker analysis in energy scenario
Published 2023“…To foster the functional safety of corresponding program-algorithmic solutions, the model checking techniques and related tools are applied to the formal specifications of named solutions. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
A framework of test case prioritisation in regression testing using particle swarm-artificial bee colony algorithm
Published 2024“…Ten knowledge and domain experts provided positive feedback on the framework's verification, affirming the framework's robustness. Validation was conducted through three experiments involving four Java programs. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
6
-
7
Compatible Pair of Nontrivial Actions for Some Cyclic Groups of 2-Power Order
Published 2015“…Some necessary and sufficient number theoretical conditions for a pair of cyclic groups of 2-power order with nontrivial actions act compatibly on each other are used to investigate some properties to find the exact number of compatible pairs of actions. Algorithms in Groups, Algorithms and Programming (GAP) software are constructed to create more examples on selected case. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
8
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…The concept of ABS algorithm was firstly studied, including the definition, historical background, and a brief comparison was made between the ABS algorithm with other types of algorithm. …”
Get full text
Get full text
Undergraduates Project Papers -
9
Numerical simulation and experimental verification on distortions induced by wire-arc additive manufacturing components and costing analysis / Keval Priapratama Prajadhiana
Published 2024“…To enlighten the application of method and procedure of numerical computation, this research is divided into two case studies. The first case study is modelling, simulating and fabricating the twenty layers deposition of hollow rectangular WAAM and the second case study is to examine pipe flange WAAM where the substrate and part distortions was be examined. …”
Get full text
Get full text
Thesis -
10
Classification System for Heart Disease Using Bayesian Classifier
Published 2007“…This system was developing base on to three main part which is data processing, testing and implementation of the algorithm. In this system a Bayesian algorithm was used in order to implement the system. …”
Get full text
Get full text
Thesis -
11
-
12
-
13
Design Rule Check To Validate Option Metal And Via For A Preprogrammed Layout Design
Published 2014“…Thus, this project will enable the verification of the option layer by developing an algorithm which able to cover the check for both option and real metal/via layer. …”
Get full text
Get full text
Thesis -
14
Development of a novel natural frequencies prediction tool for laminated composite plates using integrated artificial neural network (ANN) - simulink MATLAB / Mohd Arif Mat Norman
Published 2024“…The study conducted 16 case studies, and the program's predictions were validated using analytical methods and compared to FE modal results. …”
Get full text
Get full text
Thesis -
15
Encrypted mobile messaging application using AES block cipher cryptography algorithm / Nur Rasyiqah Zulkifli
Published 2019“…The programming language that is used to write the program is Java Language that will run on android phones. As the result, this project was tested on the functionality of the mobile messaging application. …”
Get full text
Get full text
Student Project -
16
Design Of Robot Motion Planning Algorithm For Wall Following Robot
Published 2006Get full text
Get full text
Monograph -
17
Security Analysis Between Static And Dynamic S-boxes In Block Ciphers
Published 2024Get full text
Article -
18
-
19
An Effective Fast Searching Algorithm for Internet Crawling Usage
Published 2016“…The search algorithm is a crucial part in any internet applications. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
20
Compatible pair of nontrivial actions for some cyclic groups of 2-power order
Published 2015“…Some necessary and sufficient numbers of theoretical conditions for a pair of cyclic groups of 2-power order with nontrivial actions which act compatibly on each other are used to investigate some properties in order to find the exact number of compatible pairs of actions. Algorithms in Groups, Algorithms and Programming (GAP) software are used to create more examples on selected cases. …”
Get full text
Get full text
Get full text
Conference or Workshop Item
