Search Results - (( changes detection based algorithm ) OR ( java application testing algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    Application of weighted average on modal parameters for damage detection algorithms: Case study on steel beam by Fayyadh, M.M., Abdul Razak, H.

    Published 2011
    “…Dynamic algorithms were compared to the change in the flexural rigidity as based on the change in the second moment of inertia of the beam cross-section at the crack zone. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Building norms-adaptable agents from Potential Norms Detection Technique (PNDT) by Mahmoud M.A., Ahmad M.S., Ahmad A., Mustapha A., Yusoff M.Z.M., Hamid N.H.A.

    Published 2023
    “…This technique enables an agent to update its norms even in the absence of sanctions from a third-party enforcement authority as found in some work, which entail sanctions by a third-party to detect and identify the norms. The PNDT consists of five components: agent's belief base; observation process; Potential Norms Mining Algorithm (PNMA) to detect the potential norms and identify the normative protocol; verification process, which verifies the detected potential norms; and updating process, which updates the agent's belief base with new normative protocol. …”
    Short Survey
  4. 4

    Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application by Yana Aditia, Gerhana, Nur, Lukman, Arief Fatchul, Huda, Cecep Nurul, Alam, Undang, Syaripudin, Devi, Novitasari

    Published 2020
    “…Performance Testing is used to test the performance of algorithm implementations in applications. …”
    Get full text
    Get full text
    Journal
  5. 5

    The effect of different similarity distance measures in detecting outliers using single-linkage clustering algorithm for univariate circular biological data by Nur Syahirah, Zulkipli, Siti Zanariah, Satari, Wan Nur Syahidah, Wan Yusoff

    “…Three circular similarity distance measures; Satari distance, Di distance and Chang-chien distance were used to detect outliers using a single-linkage clustering algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    A comparative analysis of image copy-move forgery detection algorithms based on hand and machine-crafted features by Ahmed I.T., Hammad B.T., Jamil N.

    Published 2023
    “…IC-MFD algorithms based hand-crafted features are the algorithms that detect the faked image depending on manual feature extraction while IC-MFD algorithms based machine-crafted features are the algorithms that detect the faked image automatically from image. …”
    Article
  7. 7

    Amplitude independent versus amplitude dependent muscle activity detection algorithms: a comparative study by Khalid Hameed, Husamuldeen, Wan Hasan, Wan Zuha, Shafie, Suhaidi, Ahmad, Siti Anom, Jaafar, Haslina

    Published 2020
    “…The amplitude dependent muscle activity detection algorithms of the surface electromyography (sEMG) signals are very sensitive to the changes in the background noise levels and the performance of these amplitude-based methods is highly deteriorated when the Signal to Noise ratio (SNR) of the sEMG signal is low. sEMG signals of deep and small muscles as well as sEMG signals recorded from patients that have neuromuscular diseases may not meet this SNR requirement which motivates the need for amplitude independent algorithms that can detect weak muscle activities. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Weighting method for modal parameter based damage detection algorithms by Fayyadh, M.M., Abdul Razak, H.

    Published 2011
    “…This study proposes weighting method for damage detection algorithms based on the bending mode shapes for beam structures. …”
    Get full text
    Get full text
    Article
  9. 9

    Artificial immune system based on real valued negative selection algorithms for anomaly detection by Khairi, Rihab Salah

    Published 2015
    “…This shows that the Negative Selection Algorithms are equipped with the capabilities of detecting changes in data, thus appropriate for anomaly detection. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    Collision avoidance algorithm design for UAV base on parametric theorem and circle overlapping method / Nur Fadzilah Mohamad Radzi by Nur Fadzilah, Mohamad Radzi

    Published 2013
    “…The algorithm is based on PTCOT (Parametric Theorem and Circle Overlapping Test) between two UAVs. …”
    Get full text
    Get full text
    Thesis
  11. 11

    The multiple outliers detection for circular univariate data using different agglomerative clustering algorithms by Nur Syahirah, Zulkipli, Siti Zanariah, Satari, Wan Nur Syahidah, Wan Yusoff

    Published 2024
    “…It has been found that SL-Chang, CL-Chang and AL-Chang algorithms work the best in detecting outliers with low masking and swamping effect when sample size is small for any percentage of outliers and concentration parameter. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12
  13. 13

    Building norms-adaptable agents from Potential Norms Detection Technique (PNDT) by Mahmoud, Moamin Ahmed, Ahmad, Mohd Sharifuddin, Ahmad, Azhana, Mustapha, Aida, Mohd Yusoff, Mohd Zaliman, Abdul Hamid, Nurzeatul Hamimah

    Published 2013
    “…This technique enables an agent to update its norms even in the absence of sanctions from a third-party enforcement authority as found in some work, which entail sanctions by a third-party to detect and identify the norms. The PNDT consists of five components: agent’s belief base; observation process; Potential Norms Mining Algorithm (PNMA) to detect the potential norms and identify the normative protocol; verification process, which verifies the detected potential norms; and updating process, which updates the agent’s belief base with new normative protocol. …”
    Get full text
    Get full text
    Article
  14. 14
  15. 15

    Development of a Raspberry Pi Drowsiness Detection System based on Histogram of Oriented Gradient (HOG) Algorithm and Eye Aspect Ratio (EAR) Formula by Francis Xavier, Sam Daniel

    Published 2020
    “…This is due to the systems’ high-power usage nature, usage of expensive technologies and difficulties in integrating the detection system into all vehicles’ system. Therefore, a Raspberry Pi drowsiness detection system based on Histogram of Oriented Gradient (HOG) algorithm and Eye Aspect Ratio (EAR) formula has been developed in this research. …”
    Get full text
    Get full text
    Final Year Project
  16. 16

    The effect of replacement strategies of genetic algorithm in regression test case prioritization of selected test cases by Musa, Samaila, Md Sultan, Abu Bakar, Abd Ghani, Abdul Azim, Baharom, Salmi

    Published 2015
    “…Regression testing is one of the software maintenance activities that is time consuming and expensive. Design-based regression testing approaches have been proposed to address changes at higher levels of abstraction, these approaches may not detect changes in the method body and several of the code based addresses procedural programs. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17
  18. 18

    A keypoint based copy-move forgery detection and localization in digital images / Somayeh Sadeghi by Somayeh, Sadeghi

    Published 2015
    “…The true and false positive rates achieved by the proposed algorithm outperform several current detection algorithms.…”
    Get full text
    Get full text
    Thesis
  19. 19

    Lane markings detection based on e-maxima transformation and improved hough by Xiao, Rui

    Published 2012
    “…A short segment of a long curve with a relatively low curvature is approximated as a straight line, based on this point, the important contribution of this thesis presents a lane detection algorithm using E-MAXIMA transformation and improved Hough transform which is the algorithm with great efficiency, high robustness and also at low cost to detect road lane markings. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Implementation of (AES) Advanced Encryption Standard algorithm in communication application by Moh, Heng Huong

    Published 2014
    “…The concept of ABS algorithm was firstly studied, including the definition, historical background, and a brief comparison was made between the ABS algorithm with other types of algorithm. …”
    Get full text
    Get full text
    Undergraduates Project Papers