Search Results - (( extracting transformation method algorithm ) OR ( java application using algorithm ))

Refine Results
  1. 1

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…The experiment contains two phases; first phase was conducted against java applications that do not use any protection to determine the ability of reversing tools to read the compiled code. …”
    Get full text
    Get full text
    Thesis
  2. 2

    The implications for ahybrid detection technique against malicious sqlattacks on web applications by Bahjat Arif, Sarajaldeen Akram, Wani, Sharyar

    Published 2025
    “…The methodology is based on JavaScript and PHP languages for developing a new technique called DetectCombined capable of filtering queries using parameterized queries to protect against SQL injection which is a safe method. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    An efficient indexing and retrieval of iris biometrics data using hybrid transform and firefly based K-means algorithm title by Khalaf, Emad Taha

    Published 2019
    “…The enhanced method combines three transformation methods for analyzing the iris image and extracting its local features. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Diagnosis of diabetic retinopathy: Automatic extraction of optic disc and exudates from retinal images using Marker-controlled watershed transformation by Reza, A.W., Eswaran, C., Dimyati, K.

    Published 2010
    “…In this paper, a new algorithm for the extraction of these bright objects from fundus images based on marker-controlled watershed segmentation is presented. …”
    Get full text
    Article
  5. 5
  6. 6

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  7. 7
  8. 8

    Fingerprint recognition using neural networks / Kennie Yeoh Eng Hoe by Kennie Yeoh , Eng Hoe

    Published 2001
    “…With tests conducted on the implementation of the Fourier Transform as a method of fingerprint feature extraction, the use of the Fourier Transform was proven not to work. …”
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10
  11. 11
  12. 12

    Fatigue Features Extraction of Road Load Time Data Using the S-Transform by S., Abdullah, Che Ku Eddy Nizwan, Che Ku Husin, M. F. M., Yunoh, M. Z., Nuawi, Z. M., Nopiah

    Published 2013
    “…In general, the S-transform (S-T) is a time-frequency spectral localization method which performs a multi-resolution analysis on signal. …”
    Get full text
    Get full text
    Article
  13. 13

    Multi road marking detection system for autonomous car using hybrid- based method by Shah, Khan Bahadur

    Published 2018
    “…The proposed system consists of a combination of Inverse Perspective Transform method, an image enhancement method and edge detection method. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    COMPUTER AIDED SYSTEM FOR BREAST CANCER DIAGNOSIS USING CURVELET TRANSFORM by MOHAMED ELTOUKHY, MOHAMED MESELHY

    Published 2011
    “…Once the ROI has been identified, an automatic cropping is performed to extract it from the original mammogram. Subsequently, the suggested feature extraction methods were applied to the segmented ROIs. …”
    Get full text
    Get full text
    Thesis
  15. 15

    A fingerprint matching algorithm using bit-plane extraction method with phase-only correlation by Florence, Francis-Lothai, Bong, David B L

    Published 2017
    “…This paper introduces a new method in fingerprint feature extraction based on bit-plane. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Multispectral palm vein image fusion for contactless palm vein verification system by Soh, Shi Chuan

    Published 2018
    “…The result shows that SIFT algorithm achieved a better recognition rate and extract more information and matching pairs compared to SURF algorithm. …”
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18

    Image watermarking optimization algorithms in transform domains and feature regions by Tao, Hai

    Published 2012
    “…As a result,it will first introduce the theories about the feature extraction and the basic principles on how feature points can act as locating resynchronization between watermark insertion and extraction discussed in detail.Subsequently,it will present several content-based watermark embedding and extraction methods which can be directly implemented based on the synchronization scheme.Further detailed watermarking schemes which combine feature regions extraction with counter propagation neural network-based watermarks synapses memorization are then presented.The performance of watermarking schemes based on framework of feature point shows the following advantages:a)Good imperceptibility. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Image classification using two dimensional wavelet coefficients with parallel computing by Ong, Yew Fai

    Published 2020
    “…The low-level features such as edges, blobs, and ridges were extracted for grouping and classification. Object recognition and image classification comes after the wavelet transform. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  20. 20