Search Results - (( program soft systems algorithm ) OR ( java application testing algorithm ))
Search alternatives:
- application testing »
- systems algorithm »
- testing algorithm »
- java application »
- program soft »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
2
-
3
Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application
Published 2020“…Performance Testing is used to test the performance of algorithm implementations in applications. …”
Get full text
Get full text
Journal -
4
Soft computing approach for solving elevator scheduling problem
Published 2010“…It is formulated as an integer programming problem. In order to solve the scheduling problem on elevator, a genetic algorithm as part of soft computing is used in a real time system. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
5
Coordination of PSS and PID controller for power system stability enhancement - overview
Published 2023“…This paper broadly reviews the optimization methods and algorithms such as Conventional methods, Soft Computing, Genetic Algorithm (GA), Evolutionary Programming (EP), Differential Evolution (DE) and Swarm Intelligence methods were available for tuning the PID gains and PSS parameters successfully. …”
Article -
6
-
7
Regionalization by fuzzy expert system based approach optimized by genetic algorithm.
Published 2013“…Genetic algorithm (GA) was employed to adjust parameters of FES and optimize the system. …”
Get full text
Get full text
Article -
8
Finite Element Modeling Of Ballistic Penetration into Fabric Armor
Published 2006“…This program (named DYNTEX) based on the mentioned algorithm is designed using MATLAB code. …”
Get full text
Get full text
Thesis -
9
-
10
-
11
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…The concept of ABS algorithm was firstly studied, including the definition, historical background, and a brief comparison was made between the ABS algorithm with other types of algorithm. …”
Get full text
Get full text
Undergraduates Project Papers -
12
Classification System for Heart Disease Using Bayesian Classifier
Published 2007“…This system was developing base on to three main part which is data processing, testing and implementation of the algorithm. In this system a Bayesian algorithm was used in order to implement the system. …”
Get full text
Get full text
Thesis -
13
-
14
-
15
Crypto Embedded System for Electronic Document
Published 2006“…The use of Cryptographic Application Programming Interface (CAPI) to bridge the application and the hardware, and the associated communication layer in the embedded system is also discussed. …”
Get full text
Get full text
Article -
16
Development of Automatic Load-Shedding Strategy for Stand-Alone Photovoltaic System
Published 2014“…The circuit of the load-shedding system is designed in the SoftCad Eagle PCB Design software. …”
Get full text
Get full text
Article -
17
Encrypted mobile messaging application using AES block cipher cryptography algorithm / Nur Rasyiqah Zulkifli
Published 2019“…The programming language that is used to write the program is Java Language that will run on android phones. As the result, this project was tested on the functionality of the mobile messaging application. …”
Get full text
Get full text
Student Project -
18
Economic power dispatch of power system with pollution control using ant colony optimization / Ahmad Mat Saad
Published 2010“…CPU times can be reduced by decomposing the optimization constraints of the power system to active constraints manipulated directly by ACO and passive constraints maintained in their soft limits using a conventional constraint load flow. …”
Get full text
Get full text
Thesis -
19
Design Of Robot Motion Planning Algorithm For Wall Following Robot
Published 2006Get full text
Get full text
Monograph -
20
Security Analysis Between Static And Dynamic S-boxes In Block Ciphers
Published 2024Get full text
Article
