Search Results - (( developing transformation method algorithm ) OR ( java application testing algorithm ))

Refine Results
  1. 1
  2. 2

    Biometric identification with limited data set by Lionnie, Regina, Attamimi, Said, Sediono, Wahju, Alaydrus, Mudrik

    Published 2019
    “…This situation can be a challenge for the recognition system. The most suitable method to produce best performance needs to be developed. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  3. 3

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption by Yeo Zi Zian

    Published 2022
    “…The selected lightweight geo-encryption algorithm will be implemented in the proposed system, vi which develops by using Java language. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  5. 5

    Tacit knowledge for business intelligence framework using cognitive-based approach by Surbakti, Herison

    Published 2022
    “…The framework was tested on 23 librarians from several university libraries in West Java and Yogyakarta, Indonesia. …”
    Get full text
    Get full text
    Thesis
  6. 6

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
    Get full text
    Get full text
    Final Year Project
  7. 7

    Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application by Yana Aditia, Gerhana, Nur, Lukman, Arief Fatchul, Huda, Cecep Nurul, Alam, Undang, Syaripudin, Devi, Novitasari

    Published 2020
    “…Performance Testing is used to test the performance of algorithm implementations in applications. …”
    Get full text
    Get full text
    Journal
  8. 8

    Compressing Images Using Multi-Level Wavelet Transform Algorithm (MWTA) by Odeh, Ali Ahmad Alabd Abu

    Published 2012
    “…This study aims to use Wavelet Transform Algorithm for image compression. Multi-levels were used in this study with the aim to produce better results for compressing images.The Multi-level Wavelet Transform Algorithm (MWTA) consists of three phases namely, first level compression, second level compressing in the first level, and algorithm validation by compare.Therefore, Vaishnavi method is used to design and develop the prototype model.In this study, the experiment was conducted using different images (RGB). …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    Semi-automatic oil palm tree counting from pleiades satellite imagery and airborne LiDAR / Nurul Syafiqah Khalid by Khalid, Nurul Syafiqah

    Published 2020
    “…Therefore, the final output of tree crown shows the watershed transformation algorithm is the best method for use represented oil palm tree counting in the map which is the accuracy assessment is 38.9%.…”
    Get full text
    Get full text
    Thesis
  10. 10

    Evolution of transformer health index in the form of mathematical equation by Azmi, Akma, Jasni, Jasronita, Azis, Norhafiz, Ab Kadir, Mohd Zainal Abidin

    Published 2017
    “…Some of the established methods of HI determination such as scoring and ranking method, tier method, matrices and multi-feature assessment model have led to the different interpretations of the final condition of a transformer. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Enhancement of Single and Composite Images Based on Contourlet Transform Approach by Melkamu, Hunegnaw Asmare

    Published 2009
    “…The objective evaluation steps show that the new method of enhancement not only superior to the commonly used transformation method (e.g. wavelet transform) but also to various spatial models (e.g. …”
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13

    Assisted History Matching by Using Genetic Algorithm and Discrete Cosine Transform by Abdul Rashid, Abdul Hadi

    Published 2014
    “…Overall, an algorithm showing the combination method of both GA and DCT was successfully developed. …”
    Get full text
    Get full text
    Final Year Project
  14. 14

    Implementation of (AES) Advanced Encryption Standard algorithm in communication application by Moh, Heng Huong

    Published 2014
    “…The concept of ABS algorithm was firstly studied, including the definition, historical background, and a brief comparison was made between the ABS algorithm with other types of algorithm. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  15. 15

    An improved split-stepwavelet transform method for anomalous radiowave propagation modeling by Iqbal, A., Jeoti, V.

    Published 2014
    “…A large number of numerical experiments are carried out to validate the performance of the proposed algorithm. Developed algorithm is compared with previously published techniques; Wavelet Galerkin Method (WGM) and Split-Step Fourier transform Method (SSFM). …”
    Get full text
    Get full text
    Article
  16. 16

    Classification System for Heart Disease Using Bayesian Classifier by Magendram, Anusha

    Published 2007
    “…This system was developing base on to three main part which is data processing, testing and implementation of the algorithm. In this system a Bayesian algorithm was used in order to implement the system. …”
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18
  19. 19

    COMPUTER AIDED SYSTEM FOR BREAST CANCER DIAGNOSIS USING CURVELET TRANSFORM by MOHAMED ELTOUKHY, MOHAMED MESELHY

    Published 2011
    “…We started this study by developing a diagnosis system. Five feature extraction methods were developed with curvelet and wavelet coefficients to differentiate between different breast cancer classes. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Fingerprint recognition using neural networks / Kennie Yeoh Eng Hoe by Kennie Yeoh , Eng Hoe

    Published 2001
    “…Alternatively, patch-matching algorithm was developed in success of the Fourier Transform method when results -were not favorable to it. …”
    Get full text
    Get full text
    Thesis