Search Results - (( java application testing algorithm ) OR ( _ verification path algorithm ))
Search alternatives:
- application testing »
- testing algorithm »
- verification path »
- java application »
- _ verification »
- path algorithm »
-
1
Biometric signature verification using pen position, time, velocity and pressure parameters
Published 2008“…A novel algorithm has been applied that provides the ability to produce consistent and high accuracy verification result and maintain the speed of verification. …”
Get full text
Get full text
Article -
2
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
3
Rtl Implementation Of Secure Hash Algorithm 3 (Sha-3) Towards Smaller Area
Published 2017“…Among all of the cryptography measures, Secure Hash Algorithm 3 (SHA-3) is the newest and secure cryptographic hash algorithm in the current electronic industry. …”
Get full text
Get full text
Thesis -
4
Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application
Published 2020“…Performance Testing is used to test the performance of algorithm implementations in applications. …”
Get full text
Get full text
Journal -
5
HOOPOE: High performance and efficient anonymous handover authentication protocol for flying out of zone UAVs
Published 2023“…Therefore, this paper presents a high-performance and efficient anonymous handover authentication protocol to secure the drone traveling path. The protocol utilizes the advantages of the AES-RSA algorithm to provide efficient and secure key management and a fast verification and signature generation that speeds up drone authentication. …”
Get full text
Get full text
Article -
6
Very Large Scale Integration Cell Based Path Extractor For Physical To Layout Mapping In Fault Isolation Work
Published 2017“…Performance differs an average of 12.6 % (iteration count) with keeping maximum allowable depth of search constant. Paths of net sequences were consistent throughout the verification of the path extractor program. …”
Get full text
Get full text
Thesis -
7
Development of web-based GIS for traffic management system with obstacle avoidance technique using open source software
Published 2014“…In order to calculate the shortest path between two nodes, Dijkstra algorithm was utilized. …”
Get full text
Get full text
Thesis -
8
Micro-sequencer based control unit design for a central processing unit
Published 2007“…Register transfer logic (RTL) level design methodology namely top level RTL architecture, RTL control algorithm, data path unit design, RTL control sequence table, microsequencer control unit design, integration of control unit and data path unit, and the functional simulation for the design verification are included in this research.…”
Get full text
Get full text
Get full text
Thesis -
9
Development Of Generative Computer-Aided Process Planning System For Lathe Machining
Published 2019“…These parameters were then useful for tooling selections and tool-path planning. The results from the automatic feature recognitions show less than 0.02% of error in comparison of algorithm overall delta volume, (ODValg) and the manual calculation ODV, (ODVmanual). …”
Get full text
Get full text
Thesis -
10
-
11
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…The concept of ABS algorithm was firstly studied, including the definition, historical background, and a brief comparison was made between the ABS algorithm with other types of algorithm. …”
Get full text
Get full text
Undergraduates Project Papers -
12
New optimization feature for the developed open cnc controller based on ISO 6983 and ISO 14649
Published 2021“…However, this system has some limitations, such as tool path optimization. This research aims to minimize tool path airtime during machining of input ISO codes via an ant colony optimization algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
13
Classification System for Heart Disease Using Bayesian Classifier
Published 2007“…This system was developing base on to three main part which is data processing, testing and implementation of the algorithm. In this system a Bayesian algorithm was used in order to implement the system. …”
Get full text
Get full text
Thesis -
14
Design and Implementation of MDS Hash Function Algorithm Using Verilog HDL
Published 2020“…A few distinct applications of hash algorithms are digital signatures, digital time stamping and the message integrity verification. …”
Get full text
Get full text
Get full text
Article -
15
-
16
-
17
Encrypted mobile messaging application using AES block cipher cryptography algorithm / Nur Rasyiqah Zulkifli
Published 2019“…The programming language that is used to write the program is Java Language that will run on android phones. As the result, this project was tested on the functionality of the mobile messaging application. …”
Get full text
Get full text
Student Project -
18
Design Of Robot Motion Planning Algorithm For Wall Following Robot
Published 2006Get full text
Get full text
Monograph -
19
Security Analysis Between Static And Dynamic S-boxes In Block Ciphers
Published 2024Get full text
Article -
20
