Search Results - (( developing sets detection algorithm ) OR ( java application testing algorithm ))
Search alternatives:
- application testing »
- testing algorithm »
- java application »
- developing sets »
- sets detection »
-
1
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…A Java-based robot development tool has been set up as alternative programming methods incorporating LeJos and the controller. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
2
Design and development of an intuitive desktop application for rapid SARS-CoV-2 diagnosis using electrochemical potentiostat
Published 2023“…In light of this, our research project aimed to develop and evaluate a highly efficient desktop application meticulously designed for a SARS-CoV-2 testing device based on electrochemical potentiostat principles. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
3
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
4
An algorithm for Elliott Waves pattern detection
Published 2018“…Based on this knowledge, an algorithm for detection of these patterns is designed, developed and tested. …”
Get full text
Get full text
Article -
5
An algorithm for Elliott Waves pattern detection
Published 2018“…Based on this knowledge, an algorithm for detection of these patterns is designed, developed and tested. …”
Get full text
Get full text
Article -
6
Extended development of a Computer Aided Detection (CAD) system for brain bleed in CT / Muhammad Illyas Abdul Muhji
Published 2018“…In this study, 227 volumes of brain CT images were used to develop and validate the CAD. The new develop algorithm is set to register image of brain patient in order to determine the rotation angle for brain realignment. …”
Get full text
Get full text
Thesis -
7
Detection and extraction features for signatures images via different techniques
Published 2019“…In this paper, three widely used feature detection algorithms, SURF, BRISK and FAST, these algorithms are compared to calculate the processing time and accuracy for set of signatures correctly. …”
Get full text
Get full text
Conference or Workshop Item -
8
Integrated combined layer algorithm of jamming detection and classification in manet / Ahmad Yusri Dak
Published 2019“…Therefore, there is a need to find a new valuation method that does not require large data sets yet yields the same results. Thus, this study proposes the development of algorithms to detect and classify jamming attacks using a set of parameters on the physical layer and MAC in MANET. …”
Get full text
Get full text
Thesis -
9
Missing tags detection algorithm for radio frequency identification (RFID) data stream
Published 2019“…Thus in this research, an AC complement algorithm with hashing algorithm and Detect False Negative Read algorithm (DFR) is used to developed the Missing Tags Detection Algorithm (MTDA). …”
Get full text
Get full text
Get full text
Get full text
Thesis -
10
Experimenting the dendrite cell algorithm for disease outbreak detection model
Published 2014“…The characteristics of early outbreak signal which are weak and behaved under uncertainties has brought to the development of outbreak detection model based on dendrite cell algorithm.Although the algorithm is proven can improve detection performance, it relies on several parameters which need to be defined before mining.In this study, the most appropriate parameter setting for outbreak detection using dendrite cell algorithm is examined.The experiment includes four parameters; the number of cell cycle update, the number of dendrite cell allowed to be in population, weight, and migration threshold value. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
11
Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application
Published 2020“…Performance Testing is used to test the performance of algorithm implementations in applications. …”
Get full text
Get full text
Journal -
12
DEVELOPMENT OF DRIVER DROWSINESS DETECTION ALGORITHM
Published 2022“…To contribute to the existing works of driver drowsiness detection systems, this project aims to develop a more useful drowsiness detection algorithm with low complexity and high performance using Python 3.10.1 software. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
13
Snake detection system using convolutional neural network / Muhammad Danial Ahmad Tarmizi
Published 2020“…The predictive model success in detecting and classifying the snake. The model achieve 96.89 % of accuracy percentage in training set and 96% of accuracy from testing set. …”
Get full text
Get full text
Thesis -
14
A novel deadlock detection algorithm for neighbour replication on grid environment
Published 2012“…The NRGDD simulation model has been developed to test the algorithm on NRG. Two experiments have been conducted to test the correctness of NRGDD algorithm. …”
Get full text
Get full text
Thesis -
15
Segmenting nodules of lung tomography image with level set algorithm and neural network
Published 2019“…Computer aided diagnosis (CAD) plays an important role in medical field which helps radiologists to detect and localise lung nodule. The aim of this research is to develop an image segmentation algorithm for nodule detection in computed tomography (CT) image. …”
Get full text
Get full text
Get full text
Get full text
Proceedings -
16
Fault diagnostic algorithm for precut fractionation column
Published 2004“…Hazard and Operability Study (HAZOP) is used to support the diagnosis task. The algorithm has been successful in detecting the deviations of each variable by testing the data set. …”
Get full text
Get full text
Conference or Workshop Item -
17
Development of novel distance relay scheme to prevent false tripping during power swing
Published 2017“…The initial work carried out in this study focuses on developing a new detection scheme that able to detect a fault that occurs during power swing. …”
Get full text
Get full text
Thesis -
18
Bayesian Network Classifiers for Damage Detection in Engineering Material
Published 2007“…The methodology used in the thesis to implement the Bayesian network for the damage detection provides a preliminary analysis used in proposing a novel fea- ture extraction algorithm (f-FFE: the f-folds feature extraction algorithm). …”
Get full text
Get full text
Thesis -
19
Improved hybrid teaching learning based optimization-jaya and support vector machine for intrusion detection systems
Published 2022“…Most of the currently existing intrusion detection systems (IDS) use machine learning algorithms to detect network intrusion. …”
Get full text
Get full text
Thesis -
20
