Search Results - (( basic detection technique algorithm ) OR ( java application testing algorithm ))
Search alternatives:
- application testing »
- testing algorithm »
- java application »
- basic detection »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
2
Distance approximation using pivot point in narrow phase collision detection
Published 2013“…Most computer games and simulation maintain speed as the main important elements while others such as medical and mechanical simulation needs to have a very high precision collision detection technique. Thus, an algorithm for the optimal distance computation algorithm for continuous collision detection is shown in this paper. …”
Get full text
Get full text
Conference or Workshop Item -
3
-
4
A Collision Detection Algorithm For Virtual Robot-Centered Flexible Manufacturing Cell
Published 2008“…The technique utilizes the narrow phase approach in detecting collision detection of non-convex object by testing collision between basic primitive and polygon. …”
Get full text
Get full text
Thesis -
5
Application Of Multi-Layer Perceptron Technique To Detect And Locate The Base Of A Young Corn Plant
Published 2007“…Prior to localization of the base of young corn tree, skeletonizing operation is performed to get the basic shape of the object. Another structure of MLP trained using backpropagation algorithm is used to detect and locate the base of the young corn tree using the skeleton of the segmented image. …”
Get full text
Get full text
Thesis -
6
-
7
The effect of different distance measures in detecting outliers using clustering-based algorithm for circular regression model
Published 2017“…Clustering technique basically utilizes distance measure to define distance between various data points. …”
Get full text
Get full text
Get full text
Article -
8
Metaheuristic-Based Neural Network Training And Feature Selector For Intrusion Detection
Published 2019“…Intrusion Detection (ID) in the context of computer networks is an essential technique in modern defense-in-depth security strategies. …”
Get full text
Get full text
Thesis -
9
-
10
Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application
Published 2020“…Performance Testing is used to test the performance of algorithm implementations in applications. …”
Get full text
Get full text
Journal -
11
INVESTIGATION OF CANNY TECHNIQUE FOR EDGE DETECTION IN IMAGE PROCESSING
Published 2004“…However, one problem with the basic Canny technique is that of so-called `Y junctions'.…”
Get full text
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
12
A comparative analysis of image copy-move forgery detection algorithms based on hand and machine-crafted features
Published 2023“…IC-MFDs based hand-crafted features and IC-MFDs based machine-crafted features. IC-MFD algorithms based hand-crafted features are the algorithms that detect the faked image depending on manual feature extraction while IC-MFD algorithms based machine-crafted features are the algorithms that detect the faked image automatically from image. …”
Article -
13
Cars detection in stitched image using morphological approach
Published 2017“…The performance of the proposed cars detection algorithm could detect the cars fairly accurate. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
14
-
15
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…The concept of ABS algorithm was firstly studied, including the definition, historical background, and a brief comparison was made between the ABS algorithm with other types of algorithm. …”
Get full text
Get full text
Undergraduates Project Papers -
16
CYCLOSTATIONARY FEATURES BASED LOW COMPLEXITY MUTLIRESOLUTION SPECTRUM SENSING FOR COGNITVE RADIO APPLICATIONS
Published 2011“…Various multi resolution techniques are used that include wavelet based spectrum estimation and spectral hole detection, wavelet based multi-resolution in analog domain and multi-resolution multiple antenna based detection. …”
Get full text
Get full text
Thesis -
17
The Role of Machine Learning and Deep Learning Approaches for the Detection of Skin Cancer
Published 2023“…This paper surveyed studies on skin cancer detection using deep learning to assess the features and advantages of other techniques. …”
Get full text
Get full text
Get full text
Article -
18
Development of a new nonlinear filtering algorithm for impulse noise reduction
Published 2020Get full text
Get full text
Research Report -
19
Medical diagnosis using data mining techniques / Shaiful Nizam Zamri
Published 2003“…Secondly, this report will review the literature part which started with basic knowledge of data mining and knowing what the basic information about data mining. …”
Get full text
Get full text
Thesis -
20
Classification System for Heart Disease Using Bayesian Classifier
Published 2007“…This system was developing base on to three main part which is data processing, testing and implementation of the algorithm. In this system a Bayesian algorithm was used in order to implement the system. …”
Get full text
Get full text
Thesis
