Search Results - (( java application testing algorithm ) OR ( changes detection _ algorithm ))
Search alternatives:
- application testing »
- testing algorithm »
- changes detection »
- java application »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
2
Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application
Published 2020“…Performance Testing is used to test the performance of algorithm implementations in applications. …”
Get full text
Get full text
Journal -
3
-
4
A Collision Detection Algorithm For Virtual Robot-Centered Flexible Manufacturing Cell
Published 2008“…The results showed that the collision detection algorithm can be used to support the concept of hardware reconfigurablility of FMC which can be achieved by changing, removing, recombining or rearranging its manufacturing elements in order to meet new demands such as introduction of new product or change.…”
Get full text
Get full text
Thesis -
5
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…The concept of ABS algorithm was firstly studied, including the definition, historical background, and a brief comparison was made between the ABS algorithm with other types of algorithm. …”
Get full text
Get full text
Undergraduates Project Papers -
6
Amplitude independent versus amplitude dependent muscle activity detection algorithms: a comparative study
Published 2020“…Moreover, the sEMG signal amplitude is not constant during the recording time due to the variation in the characteristics of the electrode-skin interface and due to the changes in the ground reference level. Therefore, the performance of the muscle activity detection algorithms should not be affected by the involuntary amplitude variations of the sEMG signal in order to achieve reliable control of robotic devices intended for disabled people.To accentuate the importance of the amplitude independent muscle activity detection methods over the amplitude dependent detection methods, a comparative study has been conducted in this paper between the performance of an amplitude independent muscle activity detection algorithm (FLA-MSE algorithm) and three amplitude dependent algorithms with respect to the detection capability of weak muscle activities and with respect to the immunity against false alarms. …”
Get full text
Get full text
Get full text
Article -
7
Classification System for Heart Disease Using Bayesian Classifier
Published 2007“…This system was developing base on to three main part which is data processing, testing and implementation of the algorithm. In this system a Bayesian algorithm was used in order to implement the system. …”
Get full text
Get full text
Thesis -
8
The multiple outliers detection for circular univariate data using different agglomerative clustering algorithms
Published 2024“…It has been found that SL-Chang, CL-Chang and AL-Chang algorithms work the best in detecting outliers with low masking and swamping effect when sample size is small for any percentage of outliers and concentration parameter. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
9
-
10
-
11
Utilization of canny and velocity bunching algorithms for modelling shoreline change
Published 2006“…This paper introduces new method for simulating shoreline change from multi-SAR data. Edge detection algorithm such as Canny algorithm is implemented to identify shoreline. …”
Get full text
Get full text
Conference or Workshop Item -
12
Building norms-adaptable agents from Potential Norms Detection Technique (PNDT)
Published 2023Subjects:Short Survey -
13
The effect of different similarity distance measures in detecting outliers using single-linkage clustering algorithm for univariate circular biological data
“…Three circular similarity distance measures; Satari distance, Di distance and Chang-chien distance were used to detect outliers using a single-linkage clustering algorithm. …”
Get full text
Get full text
Get full text
Article -
14
Encrypted mobile messaging application using AES block cipher cryptography algorithm / Nur Rasyiqah Zulkifli
Published 2019“…The programming language that is used to write the program is Java Language that will run on android phones. As the result, this project was tested on the functionality of the mobile messaging application. …”
Get full text
Get full text
Student Project -
15
Application of weighted average on modal parameters for damage detection algorithms: Case study on steel beam
Published 2011“…Dynamic algorithms were compared to the change in the flexural rigidity as based on the change in the second moment of inertia of the beam cross-section at the crack zone. …”
Get full text
Get full text
Get full text
Article -
16
Design Of Robot Motion Planning Algorithm For Wall Following Robot
Published 2006Get full text
Get full text
Monograph -
17
Develop algorithm for change detection of the salinity from Landsat-8 images
Published 2016“…The aims of this study to develop mathematical algorithms for the salinity change detection from Landsat-8 images. …”
Get full text
Get full text
Conference or Workshop Item -
18
Security Analysis Between Static And Dynamic S-boxes In Block Ciphers
Published 2024Get full text
Article -
19
Performance Comparison between RGB and HSV Color Segmentations for Road Sign Detection
Published 2013“…The experiment shows that the HSV color algorithm achieved better detection accuracy compared to RGB color space.…”
Get full text
Get full text
Article -
20
