Search Results - (( using making (programmer OR programmes) algorithm ) OR ( java application testing algorithm ))
Search alternatives:
- application testing »
- testing algorithm »
- java application »
- using making »
-
1
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The experiment contains two phases; first phase was conducted against java applications that do not use any protection to determine the ability of reversing tools to read the compiled code. …”
Get full text
Get full text
Thesis -
2
Immune-based technique for undergraduate programmes recommendation / Muhammad Azrill Mohd Zamri
Published 2017“…This study proposed an immunebased technique to recommend suitable undergraduate programmes to support applicants in decision-making. …”
Get full text
Get full text
Thesis -
3
Design and implementation of real data fast fourier transform processor on field programmable gates array
Published 2015“…In order to program the FPGA, Verilog Hardware Description Language (Verilog HDL) is used. The radix-4 FFT algorithm will be implemented for 64 and 256 points using both 8-bit and 16-bit input width. …”
Get full text
Get full text
Thesis -
4
Design of an advanced encryption standard crypto-processor core for field programmable gate array implementation
Published 2006“…The proposed AES Crypto-Processor accelerates the AES algorithm in reconfigurable Field Programmable Gate Arrays (FPGA). …”
Get full text
Get full text
Thesis -
5
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
6
Implementation Of Elevator Control System Using Raspberry PI
Published 2018“…Instead of using programmable logic controller, a Raspberry Pi was chosen to act as the master controller to perform the logic algorithm that control the movement of the elevator. …”
Get full text
Get full text
Monograph -
7
-
8
-
9
Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application
Published 2020“…Performance Testing is used to test the performance of algorithm implementations in applications. …”
Get full text
Get full text
Journal -
10
Video Game Based on Microcontroller
Published 2009“…This project is to determine the program and algorithm used by the microcontroller to reach its end objective.…”
Get full text
Final Year Project -
11
Fiber-Wireless testbed using software defined radio for protocol and algorithm testing
Published 2023“…Almost all recently proposed testbed designed for FiWi are using hardware that lacks in programmability feature, making it challenging to implement any protocols and algorithms. …”
Article -
12
Lightweight PRINCE algorithm IP core for securing GSM messaging using FPGA
Published 2023“…In this study, a new security system design for securing GSM messaging with a lightweight PRINCE algorithm Intellectual Property (IP) Core using Field Programmable Gate Arrays (FPGA) is proposed. …”
Article -
13
A Malay Chatterbot
Published 2005“…AIML is open source software, a great advantage for the project since the software can be freely used and, if necessary, modified. The simplicity of AIML makes it easy for non-programmers, especially those who already knowHTML, to get started writing chat robots.…”
Get full text
Get full text
Final Year Project -
14
-
15
New CFAR algorithm and circuit development for radar receiver
Published 2020“…Therefore, the MSS-CA-CFAR is chosen to implement by practical digital circuit and there is another important feature in the MSS-CFAR algorithm that is parallel processing since the spike selection process is done at the same time with summing of samples process that makes this algorithm much less in processing time from any other algorithm using the same environment. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
16
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…The concept of ABS algorithm was firstly studied, including the definition, historical background, and a brief comparison was made between the ABS algorithm with other types of algorithm. …”
Get full text
Get full text
Undergraduates Project Papers -
17
A controller-agnostic random oracle based intrusion detection method in software defined networks / Adnan
Published 2016“…All the hype surrounding the SDNs is predominantly because of its centralized management functionality, the separation of the control plane from the data forwarding plane, and enabling innovation through network programmability. Such distinguishing features make SDNs flexible, vendor agnostic, programmable, cost effective, and create an innovative network environment. …”
Get full text
Get full text
Thesis -
18
Flowshop scheduling using artificial bee colony (ABC) algorithm with varying onlooker bees approaches
Published 2015“…Artificial Bee Colony (ABC) algorithm is one of the methods used to solve the flowshop scheduling problem but only a few researches have been found using this method in this area. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
19
Classification System for Heart Disease Using Bayesian Classifier
Published 2007“…This system was developing base on to three main part which is data processing, testing and implementation of the algorithm. In this system a Bayesian algorithm was used in order to implement the system. …”
Get full text
Get full text
Thesis -
20
Implementation of Hybrid Indexing, Clustering and Classification Methods to Enhance Rural Development Programme in South Sulawesi
Published 2024“…Using the cosine similarity algorithm for knowledge recommendation is village identified, utilizing community feedback as the foundation. …”
Get full text
Get full text
Get full text
Get full text
Thesis
