Search Results - (( form detection using algorithm ) OR ( java application testing algorithm ))
Search alternatives:
- application testing »
- testing algorithm »
- java application »
- using algorithm »
- form detection »
-
1
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…A GUI is created in a form of JAVA application to display data detected from tag. …”
Get full text
Get full text
Thesis -
2
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
3
Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application
Published 2020“…Performance Testing is used to test the performance of algorithm implementations in applications. …”
Get full text
Get full text
Journal -
4
Temporal video segmentation using squared form of Krawtchouk-Tchebichef moments
Published 2018“…In addition, the wipe and dissolve transitions are detected using the change-point detection technique, SVM model, and scale invariant feature transform (SIFT). …”
Get full text
Get full text
Get full text
Thesis -
5
GuitarApprentice: A Mobile Application for Acoustic Guitar Learning using Fast Fourier Transform algorithm
Published 2013“…The application also aims to select the best algorithm to detect chords and display the chords detection in pictorial form for easier understanding. …”
Get full text
Get full text
Final Year Project -
6
A Detection Method for Text Steganalysis Using Evolution Algorithm (EA) Approach
Published 2012“…The aim of this project was to detect a hidden message in an observed message using text steganalysis.…”
Get full text
Get full text
Get full text
Thesis -
7
The fusion of edge detection and mathematical morphology algorithm for shape boundary recognition
Published 2016“…Edge detection algorithm is used to simplify image data by minimizing the amount of pixel to be processed, whereas the mathematical morphology is used for smoothing effects and localizing the object shape using mathematical theory sets.The discussion section focuses on the improved edge map and boundary morphology (EmaBm) algorithm as a new technique for shape boundary recognition.A comparative analysis of various edge detection algorithms is presented.It reveals that the LoG’s edge detection embedded in EmaBM algorithm performs better than the other edge detection algorithms for fruit shape boundary recognition. …”
Get full text
Get full text
Get full text
Article -
8
-
9
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…The concept of ABS algorithm was firstly studied, including the definition, historical background, and a brief comparison was made between the ABS algorithm with other types of algorithm. …”
Get full text
Get full text
Undergraduates Project Papers -
10
Real time power quality event detection using continuous wavelet transform
Published 2023Conference paper -
11
3D LiDAR Vehicle Perception and Classification Using 3D Machine Learning Algorithm
Published 2024Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
12
A novel deadlock detection algorithm for neighbour replication on grid environment
Published 2012“…The NRGDD is compared with Multi-Cycle of Deadlock Detection and Recovery (MC2DR) algorithm based on the time required for both models to detect two deadlock cycles and using different numbers of transactions. …”
Get full text
Get full text
Thesis -
13
Classification System for Heart Disease Using Bayesian Classifier
Published 2007“…This system was developing base on to three main part which is data processing, testing and implementation of the algorithm. In this system a Bayesian algorithm was used in order to implement the system. …”
Get full text
Get full text
Thesis -
14
Shot boundary detection based on orthogonal polynomial
Published 2019“…The proposed algorithm is examined using three well-known datasets which are TRECVID2005, TRECVID2006, and TRECVID2007. …”
Get full text
Get full text
Get full text
Article -
15
-
16
Early detection for server availability in University Malaya data center / Mohd Azizi Osman
Published 2016“…The objective of the system is to design the detection algorithm for server availability, to develop the detection algorithm for server availability and to test the detection algorithm form server availability. …”
Get full text
Get full text
Thesis -
17
-
18
Cluster detection for spatio-temporal dengue cases at Selangor districts using multi-EigenSpot algorithm
Published 2022“…This study aims to detect the spatio-temporal clustering or hotspot regions of dengue cases for the districts of Selangor, Malaysia using a nonparametric algorithm (Multi-EigenSpot) to detect dengue clusters. …”
Get full text
Get full text
Conference or Workshop Item -
19
Prevention of Textual Plagiarism Application
Published 2011“…Rabin - Karp Algorithm which is a string searching algorithm that uses hashing to compare the strings will be integrated in this project as well. …”
Get full text
Get full text
Final Year Project -
20
Performance analysis of coalition formation algorithms based on matching theory for cognitive radio networks
Published 2017“…For the first algorithm for coalition formation, well-known gale shapely algorithm is used to achieve cooperation among the cognitive radios for spectrum detection and sharing. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper
