Search Results - (( usage integration based algorithm ) OR ( java application testing algorithm ))
Search alternatives:
- application testing »
- usage integration »
- integration based »
- testing algorithm »
- java application »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
2
Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application
Published 2020“…Performance Testing is used to test the performance of algorithm implementations in applications. …”
Get full text
Get full text
Journal -
3
-
4
Development of a Raspberry Pi Drowsiness Detection System based on Histogram of Oriented Gradient (HOG) Algorithm and Eye Aspect Ratio (EAR) Formula
Published 2020“…This is due to the systems’ high-power usage nature, usage of expensive technologies and difficulties in integrating the detection system into all vehicles’ system. …”
Get full text
Get full text
Final Year Project -
5
Relationship based replication algorithm for data grid
Published 2014“…The Relationship based Replication algorithm aims to improve the Data Grid performance by reducing the job execution time, bandwidth and storage usage.The RBR was realized using a network simulation (OptorSim) and experiment results revealed that it offers better performance than existing replication algorithms.…”
Get full text
Get full text
Monograph -
6
Dynamic characterized genetic algorithm for adaptive beam forming in WCDMA system
Published 2005“…The new DCGA is then integrated into adaptive beam forming technique to reduce the power usage of adaptive antenna at WCDMA base station (Node B) for serving instantaneous mobile needs. …”
Get full text
Get full text
Get full text
Proceeding Paper -
7
-
8
Dynamic characterized genetic algorithm for adaptive beam forming in WCDMA system
Published 2023“…The new DCGA is then integrated into adaptive beam forming technique to reduce the power usage of adaptive antenna at WCDMA base station (Node B) for serving instantaneous mobile needs. …”
Conference paper -
9
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…The concept of ABS algorithm was firstly studied, including the definition, historical background, and a brief comparison was made between the ABS algorithm with other types of algorithm. …”
Get full text
Get full text
Undergraduates Project Papers -
10
Replica Creation Algorithm for Data Grids
Published 2012“…DRCM was evaluated using network simulation (OptorSim) based on selected performance metrics (mean job execution time, efficient network usage, average storage usage, and computing element usage), scenarios, and topologies. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
11
Classification System for Heart Disease Using Bayesian Classifier
Published 2007“…This system was developing base on to three main part which is data processing, testing and implementation of the algorithm. In this system a Bayesian algorithm was used in order to implement the system. …”
Get full text
Get full text
Thesis -
12
-
13
-
14
WCDMA teletraffic performance improvement via power resource optimization using distributed parallel genetic algorithm
Published 2023“…The algorithm works by finding the minimum transmitter power with the help of Distributed Parallel Genetic Algorithm (DPGA) employed on an offload microcontroller system to form optimal beam coverage to reduce power usage of adaptive antenna at WCDMA base station. …”
Conference paper -
15
DC MOTOR CONTROL USING GENETIC ALGORITHM BASED PID
Published 2011“…The usage of Genetic Algorithm is briefly explained which comprises of three main phases; reproduction, crossover and mutation. …”
Get full text
Get full text
Final Year Project -
16
Image encryption algorithm based on chaotic mapping
Published 2003“…This paper discusses an alternative symmetric-key encryption algorithm for securing images, namely Secure Image Encryption (SIP) that is based on chaos. …”
Get full text
Get full text
Get full text
Article -
17
Secured agriculture sensor data based on end-to-end encryption using raspberry pi
Published 2025“…Additionally, a benchmarking tool was developed to evaluate and compare the performance of these algorithms in terms of speed, memory, CPU usage, and encryption overhead. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
18
Encrypted mobile messaging application using AES block cipher cryptography algorithm / Nur Rasyiqah Zulkifli
Published 2019“…The programming language that is used to write the program is Java Language that will run on android phones. As the result, this project was tested on the functionality of the mobile messaging application. …”
Get full text
Get full text
Student Project -
19
Design Of Robot Motion Planning Algorithm For Wall Following Robot
Published 2006Get full text
Get full text
Monograph -
20
Security Analysis Between Static And Dynamic S-boxes In Block Ciphers
Published 2024Get full text
Article
