Search Results - (( severity identification based algorithm ) OR ( java application testing algorithm ))
Search alternatives:
- severity identification »
- identification based »
- application testing »
- testing algorithm »
- java application »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
2
Eeg-Based Person Identification Using Multi-Levelwavelet Decomposition With Multi-Objective Flower Pollination Algorithm
Published 2020“…But, it is a challenging task where there are three important things must be addressed carefully in any EEG-based person identification. First, one of the significant challenges concerning is a signal acquisition, which is performed by placing several electrodes on a person’s head. …”
Get full text
Get full text
Thesis -
3
Data mining based damage identification using imperialist competitive algorithm and artificial neural network
Published 2018“…In this study, to predict the damage severity of sin-gle-point damage scenarios of I-beam structures a data mining based damage identification framework and a hybrid algorithm combining Artificial Neural Network (ANN) and Imperial Competitive Algorithm (ICA), called ICA-ANN method, is proposed. …”
Get full text
Get full text
Article -
4
Date store management in sliding window based on-line identification algorithms
Published 2001Get full text
Get full text
Conference or Workshop Item -
5
Evolutionary Programming (EP) based technique for secure point identification with load shedding technique in power transmission / Abdul Rahman Minhat
Published 2008“…Consequently, another algorithm for maximum loadability identification using EP optimization technique was also developed. …”
Get full text
Get full text
Thesis -
6
-
7
An Algorithm for Summarizing Strategies Identification
Published 2008Get full text
Get full text
Get full text
Article -
8
Texture-based feature using multi-blocks gray level co-occurrence matrix for ethnicity identification
Published 2020“…Unfortunately, ethnicity identification in a multi-class which consist of several ethnic classes may degrade the accuracy of the ethnic identification. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
9
A Robust Firearm Identification Algorithm of Forensic Ballistics Specimens
Published 2017“…There are several inherent difficulties in the existing firearm identification algorithms, include requiring the physical interpretation and time consuming. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
10
A multi-color based features from facial images for automatic ethnicity identification model
Published 2019“…Finally, the proposed ethnicity identification was tested using several classification algorithms. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
11
Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application
Published 2020“…Performance Testing is used to test the performance of algorithm implementations in applications. …”
Get full text
Get full text
Journal -
12
Linear-pso with binary search algorithm for DNA motif discovery / Hazaruddin Harun
Published 2015“…However, several false and gap sequences had been identified to be present in these databases which lead to false identification. …”
Get full text
Get full text
Thesis -
13
Development of efficient iris identification algorithm using wavelet packets for smartphone application
Published 2017“…Results showed that the accuracy of the proposed algorithm is 100% identification rate.…”
Get full text
Get full text
Get full text
Get full text
Article -
14
Vibration-based structural damage detection and system identification using wavelet multiresolution analysis / Seyed Alireza Ravanfar
Published 2017“…Results indicate that the wavelet-based damage detection method precisely identified the location and severity of damages even without reference data. …”
Get full text
Get full text
Get full text
Thesis -
15
False path identification algorithm framework for nonseparable controller-data path circuits
Published 2016“…This paper proposes an algorithm frame-work to deal with these false paths through identification for DFT test. …”
Get full text
Get full text
Conference or Workshop Item -
16
Linear-PSO with binary search algorithm for DNA Motif Discovery / Hazaruddin Harun
Published 2015“…However, several false and gap sequences had been identified to be present in these databases which lead to false identification. …”
Get full text
Get full text
Book Section -
17
A Comparative of Two-Dimensional Statistical Moment Invariants Features in Formulating an Automated Probabilistic Machine Learning Identification Algorithm for Forensic Application
Published 2023“…To pursue this principal objective, several 2D statistical moment invariants have been compared and tested to determine the most suitable feature set applied in the proposed identification algorithm. …”
Get full text
Get full text
Get full text
Article -
18
Detection and Severity Identification of control valve stiction in industrial loops using integrated partially retrained CNN-PCA frameworks
Published 2021“…In addition, results based on industrial data achieve 71% accuracy in stiction detection and 80% accuracy in severity identification.…”
Get full text
Get full text
Thesis -
19
False path identification algorithm framework for nonseparable controller-data path circuits
Published 2017“…This paper proposes an algorithm framework to deal with these false paths through identification for DFT test. …”
Get full text
Get full text
Article -
20
Optimum grouping in a modified genetic algorithm for discrete-time, non-linear system identification
Published 2007“…The genetic algorithm approach is widely recognized as an effective and flexible optimization method for system identification. …”
Get full text
Get full text
Article
