Search Results - (( structures detection matching algorithm ) OR ( java application testing algorithm ))
Search alternatives:
- structures detection »
- application testing »
- testing algorithm »
- java application »
- matching »
-
1
A Comparative Analysis of Feature Extraction Algorithms for Augmented Reality Applications
Published 2021“…The quantitative results show that the ORB and SURF algorithms detect and match more features than other algorithms. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
2
Moving objects detection from UAV captured videos using trajectories of matched regional adjacency graphs
Published 2017“…The proposed framework has also been compared with existing stateof- the-art detection algorithms. Experimental results show that MDMRBF outperforms these algorithms with precision and recall being 94% and 89%, respectively. …”
Get full text
Get full text
Get full text
Thesis -
3
Web application vulnerabilities detection model
Published 2016“…The research will be carried out by using design string matching algorithm. The algorithm is used in order to match the defined criteria of each web vulnerability with the input information about web application. …”
Get full text
Get full text
Research Reports -
4
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
5
Region duplication forgery detection technique based on keypoint matching / Diaa Mohammed Hassan Uliyan
Published 2016“…Furthermore, the proposed methods are resistant to forgery where small up to 8*8 pixels and flat regions are involved, with little visual structures. The average detection rate of our algorithm maintained 96 % true positive rate and 7 % false positive rate which outperform several current detection methods. …”
Get full text
Get full text
Thesis -
6
Modified damage location indices in beam-like structure: Analytical study
Published 2011“…It is also concluded that the modified algorithms have the sensitivity to detect the damage regardless of its severity. …”
Get full text
Get full text
Article -
7
Hereditary ratio of adolescent to parent based on lips analysis using canny edge detection / Nor Shamimi Kharuddin
Published 2010“…This process significantly reduces the amount of data in the image, while preserving the most important structural features of that image. Canny edge detection is considered to be the ideal edge detection algorithm for images that are corrupted with white noise. …”
Get full text
Get full text
Thesis -
8
Deviation detection in text using conceptual graph interchange format and error tolerance dissimilarity function
Published 2012“…We employ conceptual graphs interchange format (CGIF) – a knowledge representation formalism to capture the structure and semantics of sentences. We propose a novel error tolerance dissimilarity algorithm to detect deviations in the CGIFs. …”
Get full text
Get full text
Get full text
Article -
9
A framework for multiple moving objects detection in aerial videos
Published 2019“…Comparison is also done with three existing detection algorithms where experiments show promising results with precision at 94%, and recall at 89%.…”
Get full text
Get full text
Get full text
Book Section -
10
Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application
Published 2020“…Performance Testing is used to test the performance of algorithm implementations in applications. …”
Get full text
Get full text
Journal -
11
An enhance embedding method using edge and textures detection for image steganography
Published 2024“…The findings reveal that the proposed method significantly enhances the robustness and security of image steganography, achieving an average Peak Signal-to-Noise Ratio of 18.839 dB and a Structural Similarity Index of 0.647. By embedding in noisy zones using edge and texture detection which complicates feature extraction, making hidden information more secure and statistically less detectable than basic LSB matching techniques. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
12
Dissimilarity algorithm on conceptual graphs to mine text outliers
Published 2009“…In Comparison to other text outlier detection method, this approach managed to capture the semantics of documents through the use of CGs and is convenient to detect outliers through a simple dissimilarity function.Furthermore, our proposed algorithm retains a linear complexity with the increasing number of CGs.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
13
Scalability and performance in duplicate detection : relational vs. graph database
Published 2023“…However, Neo4J excels in exact duplicate and near-duplicate detection algorithms, showcasing its strength in handling complex, interconnected data structures. …”
Get full text
Get full text
Undergraduates Project Papers -
14
Nonlinear vibration based modeling for damage detection of reinforced concrete beams / Muhammad Usman Hanif
Published 2018“…The nonlinear behavior, in the form of nonlinear vibration characteristics, was used in proposing a damage detection algorithm which doesn’t rely on the baseline data of the structure. …”
Get full text
Get full text
Get full text
Thesis -
15
-
16
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…The concept of ABS algorithm was firstly studied, including the definition, historical background, and a brief comparison was made between the ABS algorithm with other types of algorithm. …”
Get full text
Get full text
Undergraduates Project Papers -
17
Classification System for Heart Disease Using Bayesian Classifier
Published 2007“…This system was developing base on to three main part which is data processing, testing and implementation of the algorithm. In this system a Bayesian algorithm was used in order to implement the system. …”
Get full text
Get full text
Thesis -
18
-
19
-
20
Encrypted mobile messaging application using AES block cipher cryptography algorithm / Nur Rasyiqah Zulkifli
Published 2019“…The programming language that is used to write the program is Java Language that will run on android phones. As the result, this project was tested on the functionality of the mobile messaging application. …”
Get full text
Get full text
Student Project
