Search Results - (( structural testing detection algorithm ) OR ( java application testing algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    12N test procedure for NPSF testing and diagnosis for SRAMs by Rusli, Julie Roslita, Wan Hasan, Wan Zuha, Mohd Sidek, Roslina

    Published 2008
    “…The challenge of failure detection has attracted investigation on efficient testing and diagnosis algorithm for better fault coverage and diagnostic resolution. …”
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application by Yana Aditia, Gerhana, Nur, Lukman, Arief Fatchul, Huda, Cecep Nurul, Alam, Undang, Syaripudin, Devi, Novitasari

    Published 2020
    “…Performance Testing is used to test the performance of algorithm implementations in applications. …”
    Get full text
    Get full text
    Journal
  4. 4

    Biometric recognition system for UiTM Melaka Student’s Campus entrance / Khairul Rohaizzat Jamaluddin by Jamaluddin, Khairul Rohaizzat

    Published 2017
    “…It is likely that the holder is not the owner if the results come out below than 50% as the system has a facial features detection rate of 100%. The system utilized a combination of algorithms such as the Viola-Jones algorithm and SURF for facial structures and features detection. …”
    Get full text
    Get full text
    Student Project
  5. 5
  6. 6

    An optimal mesh algorithm for remote protein homology detection by M. Abdullah, Firdaus, M. Othman, Razib, Kasim, Shahreen, Hashim, Rathiah, Hassan, Rohayanti, Asmuni, Hishammuddin, Taliba, Jumail

    Published 2011
    “…Therefore, this paper deals with remote protein homology detection via assessing the impact of using structural information on protein multiple alignments over sequence information. …”
    Get full text
    Get full text
    Article
  7. 7

    Implementation of (AES) Advanced Encryption Standard algorithm in communication application by Moh, Heng Huong

    Published 2014
    “…The concept of ABS algorithm was firstly studied, including the definition, historical background, and a brief comparison was made between the ABS algorithm with other types of algorithm. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  8. 8

    Structural assessment of damaged and CFRP repaired reinforced concrete beams from experimental modal analysis / Moatasem Mohammed Fayyadh by Moatasem, Mohammed Fayyadh

    Published 2012
    “…Previous studies have used modal parameters for damage detection and the assessment of repair work, and showed that existing algorithms used for damage detection sometimes produced inaccuracies and anomalies. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Classification System for Heart Disease Using Bayesian Classifier by Magendram, Anusha

    Published 2007
    “…This system was developing base on to three main part which is data processing, testing and implementation of the algorithm. In this system a Bayesian algorithm was used in order to implement the system. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Development of optimized damage prediction method for health monitoring of ultra high performance fiber-reinforced concrete communication tower by Gatea, Sarah Jabbar

    Published 2018
    “…The verification results indicate that all the structural defects were predicted with high accuracy by the developed hybrid algorithm in cases of healthy and damaged structures. …”
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12
  13. 13
  14. 14
  15. 15

    Non-velocity based analysis of passive ultrasonic signal for source location detection in composite plates: a pilot study by Z. M., Hafizi, Epaarachchi, J., Che Ku Eddy Nizwan, Che Ku Husin, Lau, K. T.

    Published 2012
    “…A linear source location algorithm utilizing AE signals energy attenuation patterns was developed and tested for the composite specimen. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    Encrypted mobile messaging application using AES block cipher cryptography algorithm / Nur Rasyiqah Zulkifli by Zulkifli, Nur Rasyiqah

    Published 2019
    “…The programming language that is used to write the program is Java Language that will run on android phones. As the result, this project was tested on the functionality of the mobile messaging application. …”
    Get full text
    Get full text
    Student Project
  17. 17
  18. 18

    Hereditary ratio of adolescent to parent based on lips analysis using canny edge detection / Nor Shamimi Kharuddin by Kharuddin, Nor Shamimi

    Published 2010
    “…This process significantly reduces the amount of data in the image, while preserving the most important structural features of that image. Canny edge detection is considered to be the ideal edge detection algorithm for images that are corrupted with white noise. …”
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20

    Optimizing the light gradient-boosting machine algorithm for an efficient early detection of coronary heart disease by Temidayo Oluwatosin Omotehinwa, David Opeoluwa Oyewola, Ervin Gubin Moung

    Published 2024
    “…The LightGBM algorithm was selected for its efficiency in classification tasks, and Bayesian Optimization with Tree-structured Parzen Estimator (TPE) was employed to fine-tune its hyperparameters. …”
    Get full text
    Get full text
    Get full text
    Article