Search Results - (( software version method algorithm ) OR ( java applications testing algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application by Yana Aditia, Gerhana, Nur, Lukman, Arief Fatchul, Huda, Cecep Nurul, Alam, Undang, Syaripudin, Devi, Novitasari

    Published 2020
    “…Performance Testing is used to test the performance of algorithm implementations in applications. …”
    Get full text
    Get full text
    Journal
  3. 3

    Improving collection of data type evidence and the integrity of evidence collected using SHA-256 hashing algorithm for web browsers by Asmawi, Aziah, Md Yasin, Sharifah, Mohd Shah, Nur Hazierah

    Published 2024
    “…The existing tools for evidence collection primarily rely on SHA-1 hashing and using older version windows and software toolkits version. Therefore, this study proposes the addition in toolkits implementation, the latest software tools version and the latest solution, an improvement proof-of-concept utilizes SHA-256 hashing algorithm to improve the collection of evidence and enhance integrity. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4
  5. 5

    Security mechanism for wireless Mobile Ad Hoc Networks (MANET) by Abdul Rahman Sidek, Diana

    Published 2006
    “…This report provides an overview of wireless ad hoc networks, wireless threats, cryptography background and the security algorithms for this encryption method. The One Time Pad algorithm and Caesar Cipher algorithms are implemented using LabVIEW software. …”
    Get full text
    Get full text
    Student Project
  6. 6

    Application of genetic algorithm for optimal voltage control of the power system / Mohd Supian Yahya by Yahya, Mohd Supian

    Published 1998
    “…All simulation was done on the MATLAB software package version 4.2c. 1.…”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    Implementation of (AES) Advanced Encryption Standard algorithm in communication application by Moh, Heng Huong

    Published 2014
    “…The concept of ABS algorithm was firstly studied, including the definition, historical background, and a brief comparison was made between the ABS algorithm with other types of algorithm. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  9. 9

    An enhanced mobile internet protocol version 6 (IPv6) with multicast function and hierarchical design. by Khatun, Sabira

    Published 2006
    “…Mobile IPv6 mechanism requires some handover algorithm when it changes its point of attachment in the Internet.An enhanced micro mobility handover algorithm is developed on top of mobile IPv6. …”
    Get full text
    Patent
  10. 10

    Classification System for Heart Disease Using Bayesian Classifier by Magendram, Anusha

    Published 2007
    “…This system was developing base on to three main part which is data processing, testing and implementation of the algorithm. In this system a Bayesian algorithm was used in order to implement the system. …”
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12

    Seven cases unstructured triangulation technique for simplified version of conceptual model of ethylene furnace for radiative heat transfer approximation by Hasan Basari, Abd Samad, Abal Abas, Zuraida, Salleh, Shaharuddin

    Published 2012
    “…The quality of the mesh is determined based on a measurement in GAMBIT software. 7CUTT provides the framework for the heat to be approximated using the discrete ordinate method, which is a variant of the finite volume method. …”
    Get full text
    Get full text
    Article
  13. 13
  14. 14
  15. 15

    A modified n-th section line search in conjugate gradient methods for solving unconstrained optimization / Muhammad Imza Fakhri Jinudin by Jinudin, Muhammad Imza Fakhri

    Published 2018
    “…Other than that, the modified version of n-th section line search method has less amount of CPU time allocated to execute CG's algorithm when compared to the original version of n-th section line search method. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Encrypted mobile messaging application using AES block cipher cryptography algorithm / Nur Rasyiqah Zulkifli by Zulkifli, Nur Rasyiqah

    Published 2019
    “…The programming language that is used to write the program is Java Language that will run on android phones. As the result, this project was tested on the functionality of the mobile messaging application. …”
    Get full text
    Get full text
    Student Project
  17. 17
  18. 18

    Statistical analysis on enhanced 3D-AES block cipher cryptographic algorithm / Nor Azeala Mohd Yusof by Mohd Yusof, Nor Azeala

    Published 2021
    “…It is strongly suggested to implement Enhanced 3D-AES in software applications to secure data transmission.…”
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20