Search Results - (( java application testing algorithm ) OR ( source detection system algorithm ))
Search alternatives:
- application testing »
- testing algorithm »
- java application »
- source detection »
- system algorithm »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
2
LTE-based passive radar for ground target detection and tracking
Published 2015“…The systems capability to detect multi-targets moving on the ground in the same scene was also examined. …”
Get full text
Get full text
Thesis -
3
Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application
Published 2020“…Performance Testing is used to test the performance of algorithm implementations in applications. …”
Get full text
Get full text
Journal -
4
Water Pollution Source Identification Based on Real-Time Monitoring System in Siak River
Published 2021“…Location of sources pollution identified and the exact location found at the sensor node number 2 and 4 which indicated by abnormal reading data, various kind of material contained into river detected by the sensors system. …”
Get full text
Get full text
Conference or Workshop Item -
5
Failure detection analysis of grid-connected photovoltaic systems in tropical climate region / Nurmalessa Muhammad @ Atan
Published 2020“…Therefore, the aim of the study is to identify a fast, simple, and reliable method of FD on GCPV system in Malaysia. The objectives were: to develop the FD algorithm in GCPV system, to identify the types of fault occurrence in FD in GCPV system, and to verify the FD algorithm to be performed in Malaysian climate. …”
Get full text
Get full text
Thesis -
6
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
7
Development of vehicle detection and counting system for traffic analysis using computer vision
Published 2024“…In traffic analysis, a real-time vehicle detection and counting system is definitely important, as existing systems only provide the ability to detect or count, but not all of them. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
8
Relevance detection and summarizing strategies identification algorithm using linguistic measures / Seyed Asadollah Abdiesfandani
Published 2016“…The system is also able to detect copy- verbatim strategy, the most commonly strategy used by students. …”
Get full text
Get full text
Thesis -
9
Development Of Human Skin Detection Algorithm Using Multilayer Perceptron Neural Network And Clustering Method
Published 2017“…The performance of the developed system has been compared with the existing intelligent skin detection systems. …”
Get full text
Get full text
Thesis -
10
Advanced fault detection in DC microgrid system using reinforcement learning
Published 2021“…The results showed that the improved Negative Selection Algorithm with variable sized detector has better performance than the general Negative Selection Algorithm with constant sized radius in detecting fault in DC microgrid system.…”
Get full text
Get full text
Get full text
Get full text
Proceedings -
11
Develop algorithm for change detection of the salinity from Landsat-8 images
Published 2016“…The aims of this study to develop mathematical algorithms for the salinity change detection from Landsat-8 images. …”
Get full text
Get full text
Conference or Workshop Item -
12
A norms mining approach to norms detection in multi-agent systems
Published 2012“…The visitor agent detects the norms from these sources depending on their availability. …”
Get full text
Conference or Workshop Item -
13
Fuzzy modelling using firefly algorithm for phishing detection
Published 2019“…One of the suitable methods provides the Firefly Algorithm (FA). FA is a nature-inspired algorithm that uses fireflies’ behavior to interpret data. …”
Get full text
Get full text
Get full text
Article -
14
An analysis of the effect of heterogeneously distributed inertia constant in generation mix power system by using the graph theory and Dijkstra’s Algorithm
Published 2023“…In a large power system network with numerous generating sources and transmission lines, it is difficult to determine the availability of inertia in the system. …”
Get full text
Get full text
Get full text
Article -
15
A behavior based algorithm to detect spam bots
Published 2009“…Spamming causes illegal consuming of network resources in general and mail system in particular. The objective of this research is to detect the source of spam on the network by detecting the abnormal behaviors that reflect spamming activities. …”
Get full text
Get full text
Thesis -
16
An algorithm to group defects on printed circuit board for automated visual inspection
Published 2008“…However, besides the need to detect the defects, it is also essential to classify these defects so that the source of these defects can be identified. …”
Get full text
Get full text
Get full text
Article -
17
Cloud co-residency denial of service threat detection inspired by artificial immune system
Published 2024journal::journal article -
18
A hybrid unsupervised approach toward EEG epileptic spikes detection
Published 2018“…Moreover, since epileptic spike detection is a vital component of epilepsy source localization, therefore this algorithm can be utilized for EEG-based pre-surgical evaluation of epilepsy.…”
Get full text
Get full text
Get full text
Get full text
Article -
19
-
20
Anomaly detection in system log files using machine learning algorithms / Zahedeh Zamanian
Published 2019“…Therefore, there is a need for methods to detect insider threats inside an organization. Log files are great source of information which can help to detect, understand and predict these kinds of threats. …”
Get full text
Get full text
Get full text
Thesis
