Search Results - (( virtual integration method algorithm ) OR ( java application testing algorithm ))
Search alternatives:
- application testing »
- integration method »
- testing algorithm »
- method algorithm »
- java application »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
2
Virtual force field algorithm for a behaviour-based autonomous robot in unknown environments
Published 2011“…The path-planning algorithm is based on the VFF and BF methods. The proposed navigation system differs from previous works in terms of using different algorithms for planning robot motion. …”
Get full text
Get full text
Get full text
Article -
3
-
4
Enhanced path planning for industrial robot: integrating modified artificial potential field and A* algorithm / Fan Rui ... [et al.]
Published 2024“…The study proposes a modified Artificial Potential Field (APF) method integrated with the A* algorithm to enhance industrial robot path planning for obstacle avoidance. …”
Get full text
Get full text
Article -
5
-
6
Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application
Published 2020“…Performance Testing is used to test the performance of algorithm implementations in applications. …”
Get full text
Get full text
Journal -
7
Virtual reality in algorithm programming course: practicality and implications for college students
Published 2024“…Meanwhile, the effectiveness test shows that this VR product can improve learning outcomes better than traditional learning methods. Overall, the VR products developed have proven to be practical and effective in learning programming algorithms. …”
Get full text
Get full text
Get full text
Article -
8
Development of a Mobile Robot Local Navigation System Based on Fuzzy-Logic Control and Actual Virtual Target Switching
Published 2006“…While the fuzzy logic body of the algorithm performs the main tasks of obstacle avoidance, target seeking, and speed adjustment, an actual-virtual target switch strategy integrated with the fuzzy logic algorithm enables the robot to show wall following behavior when needed. …”
Get full text
Get full text
Thesis -
9
Resource scheduling algorithm with load balancing for cloud service provisioning
Published 2019“…The objective of this work is to introduce an integrated resource scheduling and load balancing algorithm for efficient cloud service provisioning. …”
Get full text
Get full text
Article -
10
-
11
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…The concept of ABS algorithm was firstly studied, including the definition, historical background, and a brief comparison was made between the ABS algorithm with other types of algorithm. …”
Get full text
Get full text
Undergraduates Project Papers -
12
Classification System for Heart Disease Using Bayesian Classifier
Published 2007“…This system was developing base on to three main part which is data processing, testing and implementation of the algorithm. In this system a Bayesian algorithm was used in order to implement the system. …”
Get full text
Get full text
Thesis -
13
-
14
-
15
-
16
-
17
Encrypted mobile messaging application using AES block cipher cryptography algorithm / Nur Rasyiqah Zulkifli
Published 2019“…The programming language that is used to write the program is Java Language that will run on android phones. As the result, this project was tested on the functionality of the mobile messaging application. …”
Get full text
Get full text
Student Project -
18
Design Of Robot Motion Planning Algorithm For Wall Following Robot
Published 2006Get full text
Get full text
Monograph -
19
Numerical analysis
Published 2008“…Selecting a numerical method, or family of methods, and integrating the method or methods into a software package, deals with all these challenges and, of necessity, seeks compromises between them. …”
Get full text
Get full text
Get full text
Article -
20
Security Analysis Between Static And Dynamic S-boxes In Block Ciphers
Published 2024Get full text
Article
