Search Results - (( java applications testing algorithm ) OR ( based identification method algorithm ))
Search alternatives:
- identification method »
- applications testing »
- based identification »
- java applications »
- testing algorithm »
- method algorithm »
-
1
Mitigation of shoulder-surfing attack on picture-based passwords using falsifying authentication methods / Por Lip Yee
Published 2012“…This research was undertaken to develop methods to mitigate shoulder-surfing attack. Two falsifying authentication methods using: (i) penup event and neighbouring connectivity manipulation; and (ii) partial password selection and metaheuristic randomisation algorithm methods, were proposed. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis -
2
Recursive Subspace Identification Algorithm Using The Propagator Based Method
Published 2017“…In this paper, the recursive subspace identification algorithm based on the propagator method which avoids the SVD computation is proposed. …”
Get full text
Get full text
Get full text
Article -
3
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
4
Smoothed functional algorithm with norm-limited update vector for identification of continuous-time fractional-order Hammerstein Models
Published 2024“…In particular, the standard smoothed functional algorithm (SFA) based method is modified by implementing a limit function in the update vector of the standard SFA based method to solve the issue of high tendency of divergence during the identification process. …”
Get full text
Get full text
Get full text
Article -
5
Deterministic Mutation-Based Algorithm for Model Structure Selection in Discrete-Time System Identification
Published 2011“…System identification is a method of determining a mathematical relation between variables and terms of a process based on observed input-output data. …”
Get full text
Get full text
Get full text
Article -
6
Identification of power poles based on satellite stereo images using graph-cut algorithm
Published 2015“…The method is based on Graph-Cut algorithm which applied on satellite stereo images. …”
Get full text
Get full text
Conference or Workshop Item -
7
Relevance detection and summarizing strategies identification algorithm using linguistic measures / Seyed Asadollah Abdiesfandani
Published 2016“…iii The summarizing strategies identification module relies on a set of heuristic rules, statistical and linguistic methods such as position-based method, title-based method, cue-phrase method and word-frequency method to identify the summarizing strategies employed by students. …”
Get full text
Get full text
Thesis -
8
-
9
Hybrid DE and PEM algorithm for identification of small scale Autonomous helicopter model
Published 2012“…The proposed hybrid identification method explored the evolutionary search optimization strength of DE for parameter initialization for PEM identification algorithm…”
Get full text
Get full text
Monograph -
10
Identification of the thermoelectric cooler using hybrid multi-verse optimizer and sine cosine algorithm based continuous-time Hammerstein model
Published 2021“…This paper presents the identification of the ThermoElectric Cooler (TEC) plant using a hybrid method of Multi-Verse Optimizer with Sine Cosine Algorithm (hMVOSCA) based on continuous-time Hammerstein model. …”
Get full text
Get full text
Get full text
Article -
11
Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application
Published 2020“…Performance Testing is used to test the performance of algorithm implementations in applications. …”
Get full text
Get full text
Journal -
12
Data mining based damage identification using imperialist competitive algorithm and artificial neural network
Published 2018“…In this study, to predict the damage severity of sin-gle-point damage scenarios of I-beam structures a data mining based damage identification framework and a hybrid algorithm combining Artificial Neural Network (ANN) and Imperial Competitive Algorithm (ICA), called ICA-ANN method, is proposed. …”
Get full text
Get full text
Article -
13
Date store management in sliding window based on-line identification algorithms
Published 2001Get full text
Get full text
Conference or Workshop Item -
14
Register Transfer Level Implementation Of Pooling - Based Feature Extraction For Finger Vein Identification
Published 2017“…Many improvements methods were utilized to increase the speed and accuracy of the identification. …”
Get full text
Get full text
Thesis -
15
-
16
Identification of power poles based on satellite stereo images using graph-cut algorithm
Published 2015“…The method is based on Graph-Cut algorithm which applied on satellite stereo images. …”
Get full text
Get full text
Conference or Workshop Item -
17
Identification of continuous-time hammerstein system using sine cosine algorithm
Published 2019“…This paper presents the development of identification of continuous-time Hammerstein systems based on Sine Cosine Algorithm (SCA). …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
18
Eeg-Based Person Identification Using Multi-Levelwavelet Decomposition With Multi-Objective Flower Pollination Algorithm
Published 2020“…For addressing these points, a novel person identification method that is using EEG with multi-level wavelet decomposition and multi-objective flower pollination algorithm is proposed in this thesis. …”
Get full text
Get full text
Thesis -
19
Modified multi-verse optimizer for nonlinear system identification of a double pendulum overhead crane
Published 2021“…In the HMVOSCA algorithm, the new position updating mechanism of the traditional MVO method is modified based on the sine function and cosine function which is taken from the Sine Cosine Algorithm (SCA). …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
20
Opposition- based simulated kalman filters and their application in system identification
Published 2017“…Among the various kinds of optimization algorithms, Simulated Kalman Filter (SKF) is a new population-based optimization algorithm inspired by the estimation capability of Kalman Filter. …”
Get full text
Get full text
Thesis
