Search Results - (( evolution segmentation using algorithm ) OR ( java implementation level algorithm ))
Search alternatives:
- implementation level »
- java implementation »
- using algorithm »
- level algorithm »
- evolution »
- segmentation »
-
1
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…The encryption algorithms are playing an important part in the protection level for data. …”
Get full text
Get full text
Thesis -
2
Adaptive Initial Contour and Partly-Normalization Algorithm for Iris Segmentation of Blurry Iris Images
Published 2022“…Moreover, evolution or convergence speed remains a significant challenge for active contour as it segments the precise iris boundary. …”
Get full text
Get full text
Get full text
Get full text
Article -
3
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…Internet communication has become more common in this modern world recently, and one of the important algorithms used is ABS algorithm. However, most of the users have inadequate knowledge and understanding regard to this algorithm implementation in the communication field, as well as the level of security and accuracy will be questioned by the users because of the necessary to maintain the confidentiality of particular data transferred. …”
Get full text
Get full text
Undergraduates Project Papers -
4
A hyper-heuristic based strategy for image segmentation using multilevel thresholding
Published 2025“…EMCQ uses four low-level heuristic sets adopted from the teaching learning-based optimisation (TLBO) algorithm, flower pollination algorithm (FPA), genetic algorithm (GA), and Jaya algorithm. …”
Get full text
Get full text
Get full text
Article -
5
A hyper-heuristic based strategy for image segmentation using multilevel thresholding
Published 2025“…EMCQ uses four low-level heuristic sets adopted from the teaching learning-based optimisation (TLBO) algorithm, flower pollination algorithm (FPA), genetic algorithm (GA), and Jaya algorithm. …”
Get full text
Get full text
Get full text
Article -
6
Estimation of small-scale kinetic parameters of escherichia coli (E. coli) model by enhanced segment particle swarm optimization algorithm ese-pso
Published 2023“…In this regard, the result of the ESe-PSO algorithm achieved superior accuracy compared with the Segment Particle Swarm Optimization (Se-PSO), Particle Swarm Optimization (PSO), Genetic Algorithm (GA), and Differential Evolution (DE) algorithms. …”
Get full text
Get full text
Get full text
Article -
7
Segmentation of Retinal Vasculature using Active Contour Models (Snakes)
Published 2009“…Active contour model (snake) that based on level sets, techniques of curve evolution, and Mumford-Shah functional for segmentation is then used to segment out the detected retinal vessel and produce a complete retinal vasculature. …”
Get full text
Get full text
Final Year Project -
8
Implementation of locust inspired scheduling algorithm with huge number of servers for energy efficiency in a cloud datacenter
Published 2019“…It does not consider the LACE algorithm implemented in huge number of server in one Cloud datacenter. …”
Get full text
Get full text
Thesis -
9
A Model for Evaluation of Cryptography Algorithm on UUM Portal
Published 2004“…Level one is the development of userID and password, level two involve the insertion of the testing parameter speed coding. …”
Get full text
Get full text
Get full text
Thesis -
10
Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application
Published 2020“…Performance Testing is used to test the performance of algorithm implementations in applications. The test results show that the Boyer Moore and Knuth Morris Pratt algorithms have an accuracy rate of 100%, and the Horspool algorithm 85.3%. …”
Get full text
Get full text
Journal -
11
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…We use a parallel technique that divides RSA power process into seperate threads and employs the use of Chinese Remainder Theorem (CRT) to decrease the time required for both encryption and decryption operation. Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
12
Iris Segmentation Analysis using Integro-Differential Operator and Hough Transform in Biometric System
Published 2012“…There are four steps in iris recognition: segmentation,normalization, encoding and matching. Here, iris segmentation has been implemented using Hough Transform and Integro-Differential Operator techniques. …”
Get full text
Get full text
Article -
13
Iris Segmentation Analysis Using Integro-Differential Operator And Hough Transform In Biometric System
Published 2012“…Iris segmentation is foremost part of iris recognition system.There are four steps in iris recognition: segmentation,normalization,encoding and matching.Here, iris segmentation has been implemented using Hough Transform and IntegroDifferential Operator techniques.The performance of iris recognition system depends on segmentation and normalization technique.Iris recognition systems capture an image from individual eye.Then the image captured is segmented and normalized for encoding process.The matching technique,Hamming Distance,is used to match the iris codes of iris in the database weather it is same with the newly enrolled for verification stage.These processes produce values of average circle pupil,average circle iris,error rate and edge points.The values provide acceptable measures of accuracy False Accept Rate (FAR) or False Reject Rate (FRR).Hough Transform algorithm,provide better performance,at the expense of higher computational complexity.It is used to evolve a contour that can fit to a non-circular iris boundary.However,edge information is required to control the evolution and stopping the contour.The performance of Hough Transform for CASIA database was 80.88% due to the lack of edge information.The GAR value using Hough Transform is 98.9% genuine while 98.6% through Integro-Differential Operator.…”
Get full text
Get full text
Get full text
Article -
14
Design and Implementation of Data-at-Rest Encryption for Hadoop
Published 2017“…Therefore, the AES encryption algorithm has been implemented in HDFS to ensure the security of data stored in HDFS. …”
Get full text
Get full text
Conference or Workshop Item -
15
Design and Implementation of Data-at-Rest Encryption for Hadoop
Published 2017“…Therefore, the AES encryption algorithm has been implemented in HDFS to ensure the security of data stored in HDFS. …”
Get full text
Get full text
Conference or Workshop Item -
16
Segmenting CT images of bronchogenic carcinoma with bone metastases using PET intensity markers approach
Published 2009“…The region growing method highly depends on where the growing process starts. Here, by using the data acquired from other modality, we tried to guide the segmentation process to achieve better segmentation results. …”
Get full text
Get full text
Article -
17
Impacting clinical evaluation of anterior talofibular ligament injuries through analysis of ultrasound images
Published 2016“…The enhanced contrast image is further optimized by the particle swarm optimization algorithm. Thereafter, the optimized image is processed by the Chan-Vese method to extract the ATFL region through curve evolution; then the resultant image smoothed by morphological operation. …”
Get full text
Get full text
Article -
18
Impacting clinical evaluation of anterior talofibular ligament injuries through analysis of ultrasound images
Published 2016“…The enhanced contrast image is further optimized by the particle swarm optimization algorithm. Thereafter, the optimized image is processed by the Chan-Vese method to extract the ATFL region through curve evolution; then the resultant image smoothed by morphological operation. …”
Get full text
Get full text
Article -
19
Enhanced image segmentation in thermal infrared image processing for faulty detection on broadcasting equipment / Mohd Rizman Sultan Mohd, Sukreen Hana Herman and Zaiton Sharif
Published 2018“…The data gathered from the system will undergo enhanced image segmentation method using k-means clustering with the implementation of histogram equalization for further image processing algorithm to detect the presence of hot spot. …”
Get full text
Get full text
Get full text
Article -
20
Secure E-Voting With Blind Signature
Published 2003“…In this system, voter’s privacy is guaranteed by using a blind signature for confidentiality and voter’s digital signature for voter’s authentication. E-Voting is implemented by employing Java socket technology and BouncyCastle cryptography provider. …”
Get full text
Get full text
Conference or Workshop Item
