Search Results - (( severity identification using algorithm ) OR ( java application testing algorithm ))
Search alternatives:
- severity identification »
- identification using »
- application testing »
- testing algorithm »
- java application »
- using algorithm »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
2
Eeg-Based Person Identification Using Multi-Levelwavelet Decomposition With Multi-Objective Flower Pollination Algorithm
Published 2020“…For addressing these points, a novel person identification method that is using EEG with multi-level wavelet decomposition and multi-objective flower pollination algorithm is proposed in this thesis. …”
Get full text
Get full text
Thesis -
3
Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application
Published 2020“…Performance Testing is used to test the performance of algorithm implementations in applications. …”
Get full text
Get full text
Journal -
4
An Algorithm for Summarizing Strategies Identification
Published 2008Get full text
Get full text
Get full text
Article -
5
Data mining based damage identification using imperialist competitive algorithm and artificial neural network
Published 2018“…In this study, to predict the damage severity of sin-gle-point damage scenarios of I-beam structures a data mining based damage identification framework and a hybrid algorithm combining Artificial Neural Network (ANN) and Imperial Competitive Algorithm (ICA), called ICA-ANN method, is proposed. …”
Get full text
Get full text
Article -
6
Date store management in sliding window based on-line identification algorithms
Published 2001“…This paper provides a brief overview of several sliding window algorithms used in on-line identification. …”
Get full text
Get full text
Conference or Workshop Item -
7
Evolutionary Programming (EP) based technique for secure point identification with load shedding technique in power transmission / Abdul Rahman Minhat
Published 2008“…Consequently, another algorithm for maximum loadability identification using EP optimization technique was also developed. …”
Get full text
Get full text
Thesis -
8
A Robust Firearm Identification Algorithm of Forensic Ballistics Specimens
Published 2017“…There are several inherent difficulties in the existing firearm identification algorithms, include requiring the physical interpretation and time consuming. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
9
Linear-pso with binary search algorithm for DNA motif discovery / Hazaruddin Harun
Published 2015“…Several DNA sequences from different species were collected from the GenBank and TRansCompel databases and used as input for the algorithm. …”
Get full text
Get full text
Thesis -
10
Texture-based feature using multi-blocks gray level co-occurrence matrix for ethnicity identification
Published 2020Get full text
Get full text
Get full text
Conference or Workshop Item -
11
Development of efficient iris identification algorithm using wavelet packets for smartphone application
Published 2017“…Results showed that the accuracy of the proposed algorithm is 100% identification rate.…”
Get full text
Get full text
Get full text
Get full text
Article -
12
Optimum grouping in a modified genetic algorithm for discrete-time, non-linear system identification
Published 2007“…Several simulated systems and real-world timedependent data are used in the investigation. …”
Get full text
Get full text
Article -
13
Optimum grouping in a modified genetic algorithm for discrete-time, non-linear system identification
Published 2007“…Several simulated systems and real-world timedependent data, are used in the investigation. …”
Get full text
Get full text
Article -
14
False path identification algorithm framework for nonseparable controller-data path circuits
Published 2016“…This paper proposes an algorithm frame-work to deal with these false paths through identification for DFT test. …”
Get full text
Get full text
Conference or Workshop Item -
15
Particle swarm optimization for NARX structure selection: application on DC motor model / Mohd Ikhwan Abdullah
Published 2010“…This thesis was presents the nonlinear identification of a DC motor using Binary Particle Swarm Optimization (BPSO) algorithm, as a model structure selection method, replacing the typical Orthogonal Least Squares (OLS) used in system identification. …”
Get full text
Get full text
Thesis -
16
False path identification algorithm framework for nonseparable controller-data path circuits
Published 2017“…This paper proposes an algorithm framework to deal with these false paths through identification for DFT test. …”
Get full text
Get full text
Article -
17
Linear-PSO with binary search algorithm for DNA Motif Discovery / Hazaruddin Harun
Published 2015“…However, several false and gap sequences had been identified to be present in these databases which lead to false identification. …”
Get full text
Get full text
Book Section -
18
-
19
Optimum grouping in a modified genetic algorithm for discrete-time, non-linear system identification
Published 2007“…Several simulated systems and real-world timedependent data are used in the investigation. …”
Get full text
Get full text
Get full text
Get full text
Article -
20
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…The concept of ABS algorithm was firstly studied, including the definition, historical background, and a brief comparison was made between the ABS algorithm with other types of algorithm. …”
Get full text
Get full text
Undergraduates Project Papers
