Search Results - (( structures detection generating algorithm ) OR ( java application testing algorithm ))
Search alternatives:
- structures detection »
- detection generating »
- generating algorithm »
- application testing »
- testing algorithm »
- java application »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
2
-
3
Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application
Published 2020“…Performance Testing is used to test the performance of algorithm implementations in applications. …”
Get full text
Get full text
Journal -
4
-
5
Enhancement of Space-Time Receiver Structure with Multiuser Detection for Wideband CDMA Communication Systems
Published 2006“…Additionally, the space-time receiver structure is combined with multiuser detection to further enhance the system. …”
Get full text
Get full text
Thesis -
6
Development of control algorithm for a new 12s-6p single phase field excited flux switching motor
Published 2020“…For position detection, algorithms merely need a basic infrared transceiver sensor. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
An optimal mesh algorithm for remote protein homology detection
Published 2011“…Therefore, this paper deals with remote protein homology detection via assessing the impact of using structural information on protein multiple alignments over sequence information. …”
Get full text
Get full text
Article -
8
Detection Of Outliers And Structural Breaks In Structural Time Series Model Using Indicator Saturation Approach
Published 2023“…Focusing on the detection of outliers and structural breaks, which has recently gained growing research interest, this study aimed to examine the performance of indicator saturation, as an extension of the general-to-specific (GETS) modelling, in detecting these structural changes in structural time series model framework. …”
Get full text
Get full text
Thesis -
9
Damage visualization based on frequency shift of single-mode ultrasound-guided wavefield
Published 2022“…Ultrasonic wavefield inspection has been available for a while and it is a great method for damage detection. However, the challenge lies in the complexity of the algorithm for mode isolation. …”
Get full text
Get full text
Article -
10
-
11
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…The concept of ABS algorithm was firstly studied, including the definition, historical background, and a brief comparison was made between the ABS algorithm with other types of algorithm. …”
Get full text
Get full text
Undergraduates Project Papers -
12
Data mining for structural damage identification using hybrid artificial neural network based algorithm for beam and slab girder / Meisam Gordan
Published 2020“…After evaluating the results of these algorithms, a hybrid Artificial Neural Network-based Imperial Competitive Algorithm (ANN-ICA) was presented in the deployment step of the proposed methodology to identify the structural damage of illustrative structures. …”
Get full text
Get full text
Get full text
Thesis -
13
Web application vulnerabilities detection model
Published 2016“…In addition, the proposed detection model will be able to generate the report regarding the level of vulnerability of the web application. …”
Get full text
Get full text
Research Reports -
14
A guided hybrid k-means and genetic algorithm models for children handwriting legibility performance assessment / Norzehan Sakamat
Published 2021“…Modifications of K-Means structures were done by inserting genetic algorithm operators and tuning the population. …”
Get full text
Get full text
Thesis -
15
Classification System for Heart Disease Using Bayesian Classifier
Published 2007“…This system was developing base on to three main part which is data processing, testing and implementation of the algorithm. In this system a Bayesian algorithm was used in order to implement the system. …”
Get full text
Get full text
Thesis -
16
Automated Model Generation Approach Using MATLAB
Published 2011“…Model generators can also be categorized into the black, grey or white box approaches, depending on the level of existing knowledge of the system’s structure and parameters. …”
Get full text
Get full text
Get full text
Book Section -
17
-
18
-
19
Hyper-heuristic approaches for data stream-based iIntrusion detection in the Internet of Things
Published 2022“…Therefore, the core classifier in the hyper-heuristic approach of Intrusion Detection System (IDS) is developed to the parallel structure NN. …”
Get full text
Get full text
Thesis -
20
False path identification algorithm framework for nonseparable controller-data path circuits
Published 2016“…It has been contended that such false paths should not be detected for test generation to keep off the unnecessary decrease in production. …”
Get full text
Get full text
Conference or Workshop Item
