Search Results - (( system implementation level algorithm ) OR ( java application testing algorithm ))
Search alternatives:
- system implementation »
- implementation level »
- application testing »
- testing algorithm »
- java application »
- level algorithm »
-
1
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…The concept of ABS algorithm was firstly studied, including the definition, historical background, and a brief comparison was made between the ABS algorithm with other types of algorithm. …”
Get full text
Get full text
Undergraduates Project Papers -
2
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
3
Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application
Published 2020“…Performance Testing is used to test the performance of algorithm implementations in applications. …”
Get full text
Get full text
Journal -
4
-
5
Process Planning Optimization In Reconfigurable Manufacturing Systems
Published 2008“…On the other hand, the superior performance of the genetic algorithm that implements an extended diversity control mechanism demonstrates that more competent genetic algorithms can be designed through customized operators. …”
Get full text
Get full text
Thesis -
6
The Development Of System For Algorithms Visualization Using Simjava
Published 2020“…The purpose of this study is to design a system for sorting algorithm visualization and implement the system.…”
Get full text
Get full text
Get full text
Article -
7
Implementation if PID controller for controlling the liquid level of the coupled tank system
Published 2009“…This project presents the PID controller design for controlling liquid level of coupled tank system. These coupled tank liquid level systems are in second order system. …”
Get full text
Get full text
Undergraduates Project Papers -
8
Implementation of PID controller for controlling the liquid level of the coupled tank system
Published 2008“…This project presents the PID controller design for controlling liquid level of coupled tank system. These coupled tank liquid level systems are in second order system. …”
Get full text
Get full text
Undergraduates Project Papers -
9
Classification System for Heart Disease Using Bayesian Classifier
Published 2007“…This system was developing base on to three main part which is data processing, testing and implementation of the algorithm. In this system a Bayesian algorithm was used in order to implement the system. …”
Get full text
Get full text
Thesis -
10
-
11
-
12
A modified H-bridge multilevel inverter for photovoltaic system
Published 2010“…The proposed system was implemented in a prototype.…”
Get full text
Article -
13
Optimal vehicle to grid planning and scheduling using double layer multi-objective algorithm
Published 2023Article -
14
-
15
-
16
-
17
Register Transfer Level Implementation Of Pooling - Based Feature Extraction For Finger Vein Identification
Published 2017“…The proposed algorithm was implemented on hardware using Verilog-HDL, and targeting Field Programmable Gate Array (FPGA) applications. …”
Get full text
Get full text
Thesis -
18
Encrypted mobile messaging application using AES block cipher cryptography algorithm / Nur Rasyiqah Zulkifli
Published 2019“…The programming language that is used to write the program is Java Language that will run on android phones. As the result, this project was tested on the functionality of the mobile messaging application. …”
Get full text
Get full text
Student Project -
19
Conjunctions in biological neural architectures for visual pose estimation / Tom´As Maul
Published 2006“…Four levels of analysis are traversed in order of decreasing abstraction: computational, algorithmic, implementational and formational. …”
Get full text
Get full text
Thesis -
20
Implementation and Evaluation of Large Rsa Encryption and Decryption Keys For Internet Security
Published 2004“…Performance has always been the most critical characteristic of a cryptographic algorithm, which determines its effectiveness. In this research the most popular and used algorithm, which is RSA, is implemented with a new modification in order to reduce the calculation time of the algorithm. …”
Get full text
Get full text
Thesis
