Search Results - (( java application testing algorithm ) OR ( frequency identification path algorithm ))
Search alternatives:
- application testing »
- identification path »
- testing algorithm »
- java application »
- path algorithm »
-
1
Classification Analysis Of High Frequency Stress Wave For Autonomous Detection Of Defect In Steel Tubes
Published 2014“…Interpretation of propagated high frequency stress wave signals in steel tubes is noteworthy for defect identification.This paper demonstrated a successful new approach for autonomous defect detection in steel tubes using classification analysis of high frequency stress waves.Classification analysis using Principal Component Analysis (PCA) algorithm involved feature extraction to reduce the dimensionality of the complex stress waves propagation path.Two defective tubes containing a slot defect of different orientation and a reference tube are inspected using Vibration Impact Acoustic Emission (VIAE) technique.The tubes are externally excited using impact hammer.The variation of stress wave transmission path are captured by high frequency Acoustic Emission sensor.The propagated stress waves in the steel tubes are classified using PCA algorithm.Classification results are graphically illustrated using a dendrogram that demonstrated the arrangement of the natural clusters of the stress wave signals.The inspection of steel tubes showed good recognition of defect in circumferential and longitudinal orientation.This approach successfully classified stress wave signals from VIAE testing and provide fast and accurate defect identification of defective steel tubes from non-defective tubes. …”
Get full text
Get full text
Get full text
Article -
2
Animal voice recognition for identification (ID) detection system
Published 2011“…In this paper, an animal identification (ID) detection system based on animal voice pattern recognition algorithm has been developed. …”
Get full text
Get full text
Conference or Workshop Item -
3
Dog voice identification (ID) for detection system
Published 2012“…In this paper, an animal identification (ID) detection system based on animal voice pattern recognition algorithm has been developed. …”
Get full text
Get full text
Conference or Workshop Item -
4
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
5
Exploratory Study on Navigation System for Visually Impaired Person
Published 2013“…Path planning algorithm will be implemented in this project to give the shortest path and direction as a navigation guide for visually impaired people. …”
Get full text
Get full text
Article -
6
Performance Study of Developed SMART EYE for Visually Impaired Person.
Published 2013“…Path planning algorithm will be implemented in this project to give the shortest path and direction as a navigation guide for visually impaired people. …”
Get full text
Get full text
Article -
7
-
8
Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application
Published 2020“…Performance Testing is used to test the performance of algorithm implementations in applications. …”
Get full text
Get full text
Journal -
9
-
10
Real time nonlinear filtered-x lms algorithm for active noise control
Published 2012“…The performance of these algorithms is usually compared with the standard linear filtered-x least mean square (FXLMS) algorithm. …”
Get full text
Get full text
Thesis -
11
-
12
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…The concept of ABS algorithm was firstly studied, including the definition, historical background, and a brief comparison was made between the ABS algorithm with other types of algorithm. …”
Get full text
Get full text
Undergraduates Project Papers -
13
Classification System for Heart Disease Using Bayesian Classifier
Published 2007“…This system was developing base on to three main part which is data processing, testing and implementation of the algorithm. In this system a Bayesian algorithm was used in order to implement the system. …”
Get full text
Get full text
Thesis -
14
-
15
-
16
Adaptive model predictive control based on wavelet network and online sequential extreme learning machine for nonlinear systems
Published 2015“…An analytical analysis based on ELM theories presented to prove the capability of the LWN to support the OSELM algorithm (LWN-OSELM). The proposed methods applied with simulations for system identification of different nonlinear systems and had shown well capability of the LWN-OSELM and WN-OSELM over NN-OSELM in terms of modelling accuracy and fast convergence performance. …”
Get full text
Get full text
Thesis -
17
Encrypted mobile messaging application using AES block cipher cryptography algorithm / Nur Rasyiqah Zulkifli
Published 2019“…The programming language that is used to write the program is Java Language that will run on android phones. As the result, this project was tested on the functionality of the mobile messaging application. …”
Get full text
Get full text
Student Project -
18
Design Of Robot Motion Planning Algorithm For Wall Following Robot
Published 2006Get full text
Get full text
Monograph -
19
Security Analysis Between Static And Dynamic S-boxes In Block Ciphers
Published 2024Get full text
Article -
20
