Search Results - (( using linux based algorithm ) OR ( java application testing algorithm ))

Refine Results
  1. 1

    VMware as an Intermediate Platform between Windows 7 and Linux Fedora 15 for Real-Time Malaysian Sign Language Translator by Bilal, Sara Mohammed Osman Saleh, Nassr, Rasheed, Akmeliawati, Rini

    Published 2014
    “…The communication between client (Windows7) and server (LINUX Fedora 16) has been established using VMware. …”
    Get full text
    Get full text
    Proceeding Paper
  2. 2
  3. 3
  4. 4

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
    Get full text
    Get full text
    Final Year Project
  5. 5

    Runtime pluggable CPU scheduler for linux operating system by Al-Maweri, Nasr Addin Ahmed Salem

    Published 2010
    “…Process scheduler, or CPU scheduler is the component of the operating system that plays the role of processes coordination and synchronization. The CPU scheduler uses different scheduling policies (algorithms) to manage such processes. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Adaptive linux-based TCP congestion control algorithm for high-speed networks by Alrshah, Mohamed A.

    Published 2017
    “…Third, to formulate an equation to automate the configuration of ʎmax parameter in order to increase the scalability of AF-based CCA. Fortunately, the results confirm the validity of the proposed algorithm. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Parallelization of noise reduction algorithm for seismic data on a beowulf cluster by Aziz, I. A., Sandran, T., Haron, N. S., Hasan, M. H, Mehat, M.

    Published 2010
    “…The parallel algorithm was developed using C language with the utilization of the Message Passing Interface (MPI) library. …”
    Get full text
    Get full text
    Citation Index Journal
  8. 8

    An Improved of Channel Allocation for WLAN Using Vertex Merge Algorithm by Mr, Handrizal, Mr, Muhammad Zarlis, Noraziah, Ahmad, Abdalla, Ahmed N.

    Published 2012
    “…A series of experiment was carried out by using one computer. Vertex Merge Algorithm (VMA) simulation is developed under Linux platform. …”
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application by Yana Aditia, Gerhana, Nur, Lukman, Arief Fatchul, Huda, Cecep Nurul, Alam, Undang, Syaripudin, Devi, Novitasari

    Published 2020
    “…Performance Testing is used to test the performance of algorithm implementations in applications. …”
    Get full text
    Get full text
    Journal
  10. 10

    Communication and computational cost on parallel algorithm of PDE elliptic type by Alias, Norma

    Published 2009
    “…The parallel algorithms of 2-dimensional Partial Differential Equation (PDE) elliptic type for the prediction will be executed using distributed memory of heterogeneous cluster platform on LINUX-based environment. …”
    Get full text
    Get full text
    Book Section
  11. 11

    The visualization of power density and temperature distribution of electronic system using elliptic PDE solver by Alias, Norma, Satam, Noriza, A. Ghaffar, Zarith Safiza

    Published 2008
    “…The elliptic solver is developed using C language and executed in Linux operating system's environment.…”
    Get full text
    Get full text
    Article
  12. 12

    An improved algorithm for channel allocation on direct sequence spread spectrum by Handrizal, M

    Published 2011
    “…Graph coloring is an assignment a color to each vertex, which each vertex that adjacent is given a different color. Graph coloring is a useful algorithm for channel allocation on Direct Sequence Spread Spectrum (DSSS).Through this algorithm,each access point (AP) that adjacent gives different channels based on colors available.Welsh Powell algorithm and Degree of saturation (Dsatur) are the popular algorithms being used for channel allocation in this domain. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Comparison of supervised machine learning algorithms for malware detection / Mohd Faris Mohd Fuzi ... [et al.] by Mohd Fuzi, Mohd Faris, Mohd Shahirudin, Syamir, Abd Halim, Iman Hazwam, Jamaluddin, Muhammad Nabil Fikri

    Published 2023
    “…To improve the detection accuracy for future research, it is suggested that the malware dataset be enhanced using several architectures, such as Linux and Android, and use additional supervised and unsupervised machine learning algorithms.…”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    A cylindrical coordinate system with dynamic permutation table for blowfish algorithm by Al-Abiachi, Ashwak M., Mahmod, Ramlan, Ahmad, Faudziah

    Published 2014
    “…The combination of a DPT with a dynamic 3D S-box strengthens the resistance of the NBA against attacks and increases the randomness of the output.C++ is used in the implementation of both algorithms.The NIST tests are implemented under Linux.…”
    Get full text
    Get full text
    Get full text
    Article
  15. 15
  16. 16

    Implementation of (AES) Advanced Encryption Standard algorithm in communication application by Moh, Heng Huong

    Published 2014
    “…The concept of ABS algorithm was firstly studied, including the definition, historical background, and a brief comparison was made between the ABS algorithm with other types of algorithm. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  17. 17

    Classification System for Heart Disease Using Bayesian Classifier by Magendram, Anusha

    Published 2007
    “…This system was developing base on to three main part which is data processing, testing and implementation of the algorithm. In this system a Bayesian algorithm was used in order to implement the system. …”
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19
  20. 20