Search Results - (( variable location detection algorithm ) OR ( java application testing algorithm ))
Search alternatives:
- application testing »
- location detection »
- variable location »
- testing algorithm »
- java application »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
2
Robust diagnostics and variable selection procedure based on modified reweighted fast consistent and high breakdown estimator for high dimensional data
Published 2022“…The proposed algorithm has been applied to detect outliers in the high dimensional data. …”
Get full text
Get full text
Thesis -
3
Observer-based fault detection with fuzzy variable gains and its application to industrial servo system
Published 2020“…Also, a scoring algorithm has been implemented, to evaluate the classification ability of the algorithm and the early fault detection ability. …”
Get full text
Get full text
Get full text
Article -
4
Detection of leak size and its location in a water distribution system by using K-NN / Nasereddin Ibrahim Sherksi
Published 2020“…Secondly, the data collected from the main valve chamber controllers, which are located in the main pipes. The successfully achieved four set objectives inclusive of (1) a new classification model to detect water leakage, (2) analysis of the effects of leakage size on the variables within a WDS, i.e. flow, pressure, pipe volume, velocity and water demand, (3) locating and specifying the leakage size in the WDS, and (4) evaluate the performance of the designed K-NN algorithm for accurate leak detection. …”
Get full text
Get full text
Thesis -
5
Road Sign Detection and Recognition System for Real-Time Embedded Applications
Published 2011“…In this paper, we propose a road sign detection and recognition algorithm for an embedded application, which requires computationally simple but accurate algorithms. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
6
Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application
Published 2020“…Performance Testing is used to test the performance of algorithm implementations in applications. …”
Get full text
Get full text
Journal -
7
Fault Detection Relevant, Neural Network and Evolutionary Algorithm based Model for a Single-shaft Industrial Gas Turbine
Published 2009“…A test on the capability of the model for fault detection revealed that it is possible to detect inlet temperature changes as low as 5 deg. …”
Get full text
Conference or Workshop Item -
8
-
9
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…The concept of ABS algorithm was firstly studied, including the definition, historical background, and a brief comparison was made between the ABS algorithm with other types of algorithm. …”
Get full text
Get full text
Undergraduates Project Papers -
10
Classification System for Heart Disease Using Bayesian Classifier
Published 2007“…This system was developing base on to three main part which is data processing, testing and implementation of the algorithm. In this system a Bayesian algorithm was used in order to implement the system. …”
Get full text
Get full text
Thesis -
11
An Automated Method For Model-Plant Mismatch Detection And Correction In Process Plants Employing Model Predictive Control (MPC)
Published 2012“…Therefore, detection of the location of the mismatch is needed so that only that channel is re-identified. …”
Get full text
Get full text
Final Year Project -
12
-
13
Extremal region detection and selection with fuzzy encoding for food recognition
Published 2019“…The first algorithm locates interest points in food images using an MSER. …”
Get full text
Get full text
Thesis -
14
Iris segmentation and normalization approach
Published 2008“…Iris is located by using a variable parameter binning approach. …”
Get full text
Get full text
Article -
15
-
16
An Optimized Semantic Segmentation Framework for Human Skin Detection
Published 2024“…Existing approaches used complex and various heuristic designs of image processing algorithms and deep models customized for skin detection problems. …”
Get full text
Get full text
Get full text
Article -
17
Detection of energy theft and defective smart meters in smart grids using linear regression
Published 2017“…Categorical variables and detection coefficients are also introduced in the model to identify the periods and locations of energy frauds as well as faulty smart meters. …”
Get full text
Get full text
Article -
18
Landslide susceptibility mapping using decision-tree based chi-squared automatic interaction detection (CHAID) and logistic regression (LR) integration
Published 2014“…A cluster pattern of landslide locations was extracted in previous study using nearest neighbor index (NNI), which were then used to identify the clustered landslide locations range. …”
Get full text
Get full text
Conference or Workshop Item -
19
Encrypted mobile messaging application using AES block cipher cryptography algorithm / Nur Rasyiqah Zulkifli
Published 2019“…The programming language that is used to write the program is Java Language that will run on android phones. As the result, this project was tested on the functionality of the mobile messaging application. …”
Get full text
Get full text
Student Project -
20
Design Of Robot Motion Planning Algorithm For Wall Following Robot
Published 2006Get full text
Get full text
Monograph
