Search Results - (( structures location detection algorithm ) OR ( java application using algorithm ))
Search alternatives:
- location detection »
- java application »
- using algorithm »
- structures »
-
1
Modified damage location indices in beam-like structure: Analytical study
Published 2011“…The modified algorithms are able to detect the damage wherever its location, applying even to cases of multi damage locations. …”
Get full text
Get full text
Article -
2
Application Of Multi-Layer Perceptron Technique To Detect And Locate The Base Of A Young Corn Plant
Published 2007“…Prior to localization of the base of young corn tree, skeletonizing operation is performed to get the basic shape of the object. Another structure of MLP trained using backpropagation algorithm is used to detect and locate the base of the young corn tree using the skeleton of the segmented image. …”
Get full text
Get full text
Thesis -
3
Experimental studies on impact damage location in composite aerospace structures using genetic algorithms and neural networks
Published 2010“…Impact damage detection in composite structures has gained a considerable interest in many engineering areas. …”
Get full text
Get full text
Get full text
Article -
4
Vibration-based structural damage detection and system identification using wavelet multiresolution analysis / Seyed Alireza Ravanfar
Published 2017“…This resulted in the high accuracy of the damage detection algorithm. The second proposed method seeks to identify damage in the structural parameters of linear and nonlinear systems. …”
Get full text
Get full text
Get full text
Thesis -
5
Non-velocity based analysis of passive ultrasonic signal for source location detection in composite plates: a pilot study
Published 2012“…The results revealed that the source location algorithm provides reasonably accurate results of source location for glass fibre epoxy resin laminate.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
6
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
7
A study of progressive damage detection in thin-walled composite structures using an embedded fiber Bragg grating – acoustic emission hybrid system
Published 2019“…The algorithm was named as cross-correlation with linear source location technique (CC-LSL) impact detection algorithm.…”
Get full text
Get full text
Research Report -
8
Using electromechanical impedance and extreme learning machine to detect and locate damage in structures
Published 2017“…The main objective in structural health monitoring is to keep track of the changes in the dynamic characteristics of the structural system in order both to detect and locate the damage, and to make a decision automatically whether the damage is in dangerous level for the structure or not. …”
Get full text
Get full text
Get full text
Get full text
Article -
9
-
10
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
11
12N test procedure for NPSF testing and diagnosis for SRAMs
Published 2008“…This paper aims to prove the efficiency of March 12N algorithm in term of detection and identification capability and locate the NPSF model fault. …”
Get full text
Get full text
Conference or Workshop Item -
12
Detection Of Outliers And Structural Breaks In Structural Time Series Model Using Indicator Saturation Approach
Published 2023“…The proposed technique is capable to detect the location, duration, magnitude and number of structural changes in time series data. …”
Get full text
Get full text
Thesis -
13
Stiffness reduction index for detection of damage location: Analytical study
Published 2011“…The study has validated the new index to detect the damage location for the case of multi damage location presented at the same time along the beam length. …”
Get full text
Get full text
Article -
14
Real-Time Video Processing Using Native Programming on Android Platform
Published 2012“…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
15
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
16
Data mining for structural damage identification using hybrid artificial neural network based algorithm for beam and slab girder / Meisam Gordan
Published 2020“…After evaluating the results of these algorithms, a hybrid Artificial Neural Network-based Imperial Competitive Algorithm (ANN-ICA) was presented in the deployment step of the proposed methodology to identify the structural damage of illustrative structures. …”
Get full text
Get full text
Get full text
Thesis -
17
Combined modal parameters-based index for damage identification in a beamlike structure: theoretical development and verification
Published 2011“…A new index for detecting the damage severity in structural elements by combining modal parameters is proposed in this study. …”
Get full text
Get full text
Get full text
Article -
18
Forward-Backward Time Stepping with Automated Edge-preserving Regularization Technique for Wood Defects Detection
Published 2019“…The FBTS integrated with automated edge-preserving regularization technique is first assessed with object detection application. The reconstructed images show that the algorithm was able to determine the dielectric properties within the region of interest (ROI) and estimate the shape, location of the embedded object. …”
Get full text
Get full text
Thesis -
19
Real-time algorithmic music composition application.
Published 2022“…This project is about the study of evolutionary music, and focuses on the development of an algorithmic music composer using the Java programming language. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
20
Performance evaluation of real-time multiprocessor scheduling algorithms
Published 2016“…We hyave used the CPU profiler of Oracle JavaTM VisualVM to monitor the execution of LRE-TL as well as USG algorithms. …”
Get full text
Get full text
Conference or Workshop Item
