Search Results - (( changes detection based algorithm ) OR ( java application using algorithm ))
Search alternatives:
- changes detection »
- java application »
- detection based »
- using algorithm »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
-
3
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
4
Application of weighted average on modal parameters for damage detection algorithms: Case study on steel beam
Published 2011“…Dynamic algorithms were compared to the change in the flexural rigidity as based on the change in the second moment of inertia of the beam cross-section at the crack zone. …”
Get full text
Get full text
Get full text
Article -
5
Building norms-adaptable agents from Potential Norms Detection Technique (PNDT)
Published 2023“…This technique enables an agent to update its norms even in the absence of sanctions from a third-party enforcement authority as found in some work, which entail sanctions by a third-party to detect and identify the norms. The PNDT consists of five components: agent's belief base; observation process; Potential Norms Mining Algorithm (PNMA) to detect the potential norms and identify the normative protocol; verification process, which verifies the detected potential norms; and updating process, which updates the agent's belief base with new normative protocol. …”
Short Survey -
6
The effect of different similarity distance measures in detecting outliers using single-linkage clustering algorithm for univariate circular biological data
“…Three circular similarity distance measures; Satari distance, Di distance and Chang-chien distance were used to detect outliers using a single-linkage clustering algorithm. …”
Get full text
Get full text
Get full text
Article -
7
A comparative analysis of image copy-move forgery detection algorithms based on hand and machine-crafted features
Published 2023“…IC-MFD algorithms based hand-crafted features are the algorithms that detect the faked image depending on manual feature extraction while IC-MFD algorithms based machine-crafted features are the algorithms that detect the faked image automatically from image. …”
Article -
8
Amplitude independent versus amplitude dependent muscle activity detection algorithms: a comparative study
Published 2020“…The amplitude dependent muscle activity detection algorithms of the surface electromyography (sEMG) signals are very sensitive to the changes in the background noise levels and the performance of these amplitude-based methods is highly deteriorated when the Signal to Noise ratio (SNR) of the sEMG signal is low. sEMG signals of deep and small muscles as well as sEMG signals recorded from patients that have neuromuscular diseases may not meet this SNR requirement which motivates the need for amplitude independent algorithms that can detect weak muscle activities. …”
Get full text
Get full text
Get full text
Article -
9
Weighting method for modal parameter based damage detection algorithms
Published 2011“…This study proposes weighting method for damage detection algorithms based on the bending mode shapes for beam structures. …”
Get full text
Get full text
Article -
10
Artificial immune system based on real valued negative selection algorithms for anomaly detection
Published 2015“…This shows that the Negative Selection Algorithms are equipped with the capabilities of detecting changes in data, thus appropriate for anomaly detection. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
11
Collision avoidance algorithm design for UAV base on parametric theorem and circle overlapping method / Nur Fadzilah Mohamad Radzi
Published 2013“…The algorithm is based on PTCOT (Parametric Theorem and Circle Overlapping Test) between two UAVs. …”
Get full text
Get full text
Thesis -
12
The multiple outliers detection for circular univariate data using different agglomerative clustering algorithms
Published 2024“…It has been found that SL-Chang, CL-Chang and AL-Chang algorithms work the best in detecting outliers with low masking and swamping effect when sample size is small for any percentage of outliers and concentration parameter. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
13
Real-Time Video Processing Using Native Programming on Android Platform
Published 2012“…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
14
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
15
Artificial neural network based fast edge detection algorithm for MRI medical images
Published 2017“…Therefore, the objective of this paper is to develop a fast ANN based edge detection algorithm for MRI medical images. …”
Get full text
Get full text
Get full text
Get full text
Article -
16
Building norms-adaptable agents from Potential Norms Detection Technique (PNDT)
Published 2013“…This technique enables an agent to update its norms even in the absence of sanctions from a third-party enforcement authority as found in some work, which entail sanctions by a third-party to detect and identify the norms. The PNDT consists of five components: agent’s belief base; observation process; Potential Norms Mining Algorithm (PNMA) to detect the potential norms and identify the normative protocol; verification process, which verifies the detected potential norms; and updating process, which updates the agent’s belief base with new normative protocol. …”
Get full text
Get full text
Article -
17
-
18
Real-time algorithmic music composition application.
Published 2022“…This project is about the study of evolutionary music, and focuses on the development of an algorithmic music composer using the Java programming language. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
19
Development of a Raspberry Pi Drowsiness Detection System based on Histogram of Oriented Gradient (HOG) Algorithm and Eye Aspect Ratio (EAR) Formula
Published 2020“…This is due to the systems’ high-power usage nature, usage of expensive technologies and difficulties in integrating the detection system into all vehicles’ system. Therefore, a Raspberry Pi drowsiness detection system based on Histogram of Oriented Gradient (HOG) algorithm and Eye Aspect Ratio (EAR) formula has been developed in this research. …”
Get full text
Get full text
Final Year Project -
20
The effect of replacement strategies of genetic algorithm in regression test case prioritization of selected test cases
Published 2015“…Regression testing is one of the software maintenance activities that is time consuming and expensive. Design-based regression testing approaches have been proposed to address changes at higher levels of abstraction, these approaches may not detect changes in the method body and several of the code based addresses procedural programs. …”
Get full text
Get full text
Get full text
Article
