Search Results - (( severity identification using algorithm ) OR ( java applications using algorithm ))
Search alternatives:
- severity identification »
- identification using »
- applications using »
- java applications »
- using algorithm »
-
1
Face recognition and identification system (FaceRec) / Khew Jye Huei
Published 2004“…It describes the implementation and functions of a working system that performs the recognition and identification of human faces using the implement algorithms. …”
Get full text
Get full text
Thesis -
2
An Agent-Based System with Personalization and Intelligent Assistance Services for Facilitating Knowledge Sharing
Published 2006“…KSFaci is embedded in web environment and is implemented using Java Servlet and runs under Apache server. …”
Get full text
Get full text
Thesis -
3
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
4
-
5
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
6
Eeg-Based Person Identification Using Multi-Levelwavelet Decomposition With Multi-Objective Flower Pollination Algorithm
Published 2020“…For addressing these points, a novel person identification method that is using EEG with multi-level wavelet decomposition and multi-objective flower pollination algorithm is proposed in this thesis. …”
Get full text
Get full text
Thesis -
7
An Algorithm for Summarizing Strategies Identification
Published 2008Get full text
Get full text
Get full text
Article -
8
Data mining based damage identification using imperialist competitive algorithm and artificial neural network
Published 2018“…In this study, to predict the damage severity of sin-gle-point damage scenarios of I-beam structures a data mining based damage identification framework and a hybrid algorithm combining Artificial Neural Network (ANN) and Imperial Competitive Algorithm (ICA), called ICA-ANN method, is proposed. …”
Get full text
Get full text
Article -
9
Date store management in sliding window based on-line identification algorithms
Published 2001“…This paper provides a brief overview of several sliding window algorithms used in on-line identification. …”
Get full text
Get full text
Conference or Workshop Item -
10
Evolutionary Programming (EP) based technique for secure point identification with load shedding technique in power transmission / Abdul Rahman Minhat
Published 2008“…Consequently, another algorithm for maximum loadability identification using EP optimization technique was also developed. …”
Get full text
Get full text
Thesis -
11
A Robust Firearm Identification Algorithm of Forensic Ballistics Specimens
Published 2017“…There are several inherent difficulties in the existing firearm identification algorithms, include requiring the physical interpretation and time consuming. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
12
Linear-pso with binary search algorithm for DNA motif discovery / Hazaruddin Harun
Published 2015“…Several DNA sequences from different species were collected from the GenBank and TRansCompel databases and used as input for the algorithm. …”
Get full text
Get full text
Thesis -
13
Texture-based feature using multi-blocks gray level co-occurrence matrix for ethnicity identification
Published 2020Get full text
Get full text
Get full text
Conference or Workshop Item -
14
Development of efficient iris identification algorithm using wavelet packets for smartphone application
Published 2017“…Results showed that the accuracy of the proposed algorithm is 100% identification rate.…”
Get full text
Get full text
Get full text
Get full text
Article -
15
Real-Time Video Processing Using Native Programming on Android Platform
Published 2012“…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
16
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
17
Optimum grouping in a modified genetic algorithm for discrete-time, non-linear system identification
Published 2007“…Several simulated systems and real-world timedependent data are used in the investigation. …”
Get full text
Get full text
Article -
18
Optimum grouping in a modified genetic algorithm for discrete-time, non-linear system identification
Published 2007“…Several simulated systems and real-world timedependent data, are used in the investigation. …”
Get full text
Get full text
Article -
19
False path identification algorithm framework for nonseparable controller-data path circuits
Published 2016“…This paper proposes an algorithm frame-work to deal with these false paths through identification for DFT test. …”
Get full text
Get full text
Conference or Workshop Item -
20
Particle swarm optimization for NARX structure selection: application on DC motor model / Mohd Ikhwan Abdullah
Published 2010“…This thesis was presents the nonlinear identification of a DC motor using Binary Particle Swarm Optimization (BPSO) algorithm, as a model structure selection method, replacing the typical Orthogonal Least Squares (OLS) used in system identification. …”
Get full text
Get full text
Thesis
