Search Results - (( mobile extraction method algorithm ) OR ( java application testing algorithm ))
Search alternatives:
- application testing »
- mobile extraction »
- extraction method »
- testing algorithm »
- method algorithm »
- java application »
-
1
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
Get full text
Get full text
Thesis -
2
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
3
Data mining in mobile ECG based biometric identification
Published 2014“…Subjects in MIT-BIH Normal Sinus Rhythm Database (NSRDB) were used to validate the reliability and stability of the subject recognition methods. Discriminatory features extracted from the experimentation were later applied to different classifiers for performance measures based on the complexity of our proposed sample extraction method when compared to other related algorithms, the total execution time (TET) applied on different classifiers in various mobile devices and the classification accuracies when applied to various classification techniques. …”
Get full text
Get full text
Get full text
Article -
4
Extracting crown morphology with a low-cost mobile LiDAR scanning system in the natural environment
Published 2021“…Finally, morphological parameters of the canopy, such as crown height, crown diameter, and crown volume, are extracted using statistical and voxel methods. To verify the algorithm, a total of 43 trees in multiple plots of the campus were tested and compared. …”
Get full text
Get full text
Get full text
Article -
5
Overhead vision system for mobile robot orientation detection
Published 2011“…Cameras are used to capture the images of mobile robot at various orientations. The images are preprocessed and important features are extracted to be used in the proposed methods. …”
Get full text
Thesis -
6
-
7
Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application
Published 2020“…Performance Testing is used to test the performance of algorithm implementations in applications. …”
Get full text
Get full text
Journal -
8
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…Power consumption is one major constraint that makes traditional detection methods impractical for mobile devices, while cloud-based techniques raise many privacy concerns. …”
Get full text
Get full text
Get full text
Thesis -
9
Reduced Set Kernel Principal Component Analysis (Rskpca) Algorithm for Palm Print Based Mobile Biometric System
Published 2015“…In this project, it has been proven that the proposed RSKPCA as feature extraction gives the best result for mobile biometric system based on palm print. …”
Get full text
Get full text
Thesis -
10
Designing an expressive virtual Kompang on mobile device with tri-axial accelerometer
Published 2018“…This paper is therefore implemented a simple extraction method by extracting percussive features from embedded sensors to map with the output sound with minimum delay. …”
Get full text
Get full text
Get full text
Article -
11
Color Image Segmentation Based on Bayesian Theorem for Mobile Robot Navigation
Published 2009“…In order to show the real time ability and robustness of proposed method for color segmentation, experimental results conducted on vision based mobile robot for navigation. …”
Get full text
Get full text
Thesis -
12
Optimising acoustic features for source mobile device identification using spectral analysis techniques / Mehdi Jahanirad
Published 2016“…Hence, addressing robust feature extraction methods for source communication device identification is necessary. …”
Get full text
Get full text
Thesis -
13
-
14
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…The concept of ABS algorithm was firstly studied, including the definition, historical background, and a brief comparison was made between the ABS algorithm with other types of algorithm. …”
Get full text
Get full text
Undergraduates Project Papers -
15
The classification of wink-based eeg signals by means of transfer learning models
Published 2021“…This study aimed to explore the performance of different pre-processing methods, namely Fast Fourier Transform, Short-Time Fourier Transform, Discrete Wavelet Transform, and Continuous Wavelet Transform (CWT) that could allow TL models to extract features from the images generated and classify through selected classical ML algorithms . …”
Get full text
Get full text
Thesis -
16
Classification System for Heart Disease Using Bayesian Classifier
Published 2007“…This system was developing base on to three main part which is data processing, testing and implementation of the algorithm. In this system a Bayesian algorithm was used in order to implement the system. …”
Get full text
Get full text
Thesis -
17
-
18
-
19
EEG-Based Brain-Machine Interface (BMI) for Controlling Mobile Robots: The Trend of Prior Studies
Published 2015“…In this paper, we review the background, feature extraction and classification algorithms used to design the Electroencephalography (EEG) based Brain-Machine Interface (BMI) to control the mobile robots.…”
Get full text
Get full text
Article -
20
Encrypted mobile messaging application using AES block cipher cryptography algorithm / Nur Rasyiqah Zulkifli
Published 2019“…The programming language that is used to write the program is Java Language that will run on android phones. As the result, this project was tested on the functionality of the mobile messaging application. …”
Get full text
Get full text
Student Project
