Search Results - (( data deviation based algorithm ) OR ( java application testing algorithm ))
Search alternatives:
- application testing »
- testing algorithm »
- java application »
- deviation based »
- data deviation »
-
1
Sensing texture using an artificial finger and a data analysis based on the standard deviation
Published 2015“…For the automatic control of an artificial hand and to feedback information to the amputee, an algorithm has been developed based on the standard deviation of signal data from the sensor. …”
Get full text
Get full text
Get full text
Article -
2
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
3
Sensing texture using an artificial finger and a data analysis based on the standard deviation
Published 2015“…For the automatic control of an artificial hand and to feedback information to the amputee, an algorithm has been developed based on the standard deviation (SD) of signal data from the sensor. …”
Get full text
Get full text
Get full text
Get full text
Article -
4
Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application
Published 2020“…Performance Testing is used to test the performance of algorithm implementations in applications. …”
Get full text
Get full text
Journal -
5
Hazard identification on fractionation column using rule based expert system
Published 2001“…The link between Hazard and Operability Study result documentation with data base of process operation is important, in order to analyse the causes and consequences of the whole process deviation on fractionation column. …”
Get full text
Get full text
Article -
6
Deviation detection in text using conceptual graph interchange format and error tolerance dissimilarity function
Published 2012“…This paper focuses on a graph-based approach for text representation and presents a novel error tolerance dissimilarity algorithm for deviation detection. …”
Get full text
Get full text
Get full text
Article -
7
Development of a rule-based fault diagnostic advisory system for precut fractionation column
Published 2005“…The advisory system algorithm used process history based method and presented by rule-based approach. …”
Get full text
Get full text
Thesis -
8
Fault diagnostic algorithm for precut fractionation column
Published 2004“…Hazard and Operability Study (HAZOP) is used to support the diagnosis task. The algorithm has been successful in detecting the deviations of each variable by testing the data set. …”
Get full text
Get full text
Conference or Workshop Item -
9
-
10
A study of fluctuations and confidence of implementation in genetic algorithm optimized network in data centre
Published 2018“…The purpose of this study is to observe the reliability of genetic algorithm in our previously simulated network optimization in a data centre. …”
Get full text
Get full text
Article -
11
A study of fluctuations and confidence of implementation in genetic algorithm optimized network in data centre
Published 2018“…The purpose of this study is to observe the reliability of genetic algorithm in our previously simulated network optimization in a data centre. …”
Get full text
Get full text
Article -
12
-
13
An online density-based clustering algorithm for data stream based on local optimal radius and cluster pruning
Published 2019“…BOCEDS clusters the data stream in a single stage. The algorithm summarizes the data from data stream in micro-clusters. …”
Get full text
Get full text
Thesis -
14
The effect of different distance measures in detecting outliers using clustering-based algorithm for circular regression model
Published 2017“…In this study, we proposed multiple outliers detection in circular regression models based on the clustering algorithm. Clustering technique basically utilizes distance measure to define distance between various data points. …”
Get full text
Get full text
Get full text
Article -
15
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…The concept of ABS algorithm was firstly studied, including the definition, historical background, and a brief comparison was made between the ABS algorithm with other types of algorithm. …”
Get full text
Get full text
Undergraduates Project Papers -
16
Comparative study of clustering-based outliers detection methods in circular-circular regression model
Published 2021“…This paper is a comparative study of several algorithms for detecting multiple outliers in circular-circular regression model based on the clustering algorithms. …”
Get full text
Get full text
Get full text
Article -
17
Comparative study of clustering-based outliers detection methods in circularcircular regression model
Published 2021“…This paper is a comparative study of several algorithms for detecting multiple outliers in circular-circular regression model based on the clustering algorithms. …”
Get full text
Get full text
Get full text
Article -
18
Development of a computer vision-based technique for analysis of hand therapy exercise
Published 2018“…These measurement values are almost similar to the standard ROM reference values which are 20° for radial deviation, -30° for ulnar deviation, 140° for flexion and 0° for extension. …”
Get full text
Get full text
Get full text
Thesis -
19
Comparative study of clustering-based outliers detection methods in circular-circular regression model
Published 2021“…This paper is a comparative study of several algorithms for detecting multiple outliers in circular-circular regression model based on the clustering algorithms. …”
Get full text
Get full text
Get full text
Article -
20
Classification System for Heart Disease Using Bayesian Classifier
Published 2007“…This system was developing base on to three main part which is data processing, testing and implementation of the algorithm. In this system a Bayesian algorithm was used in order to implement the system. …”
Get full text
Get full text
Thesis
