Search Results - (( extracting transformation method algorithm ) OR ( java application using algorithm ))
Search alternatives:
- extracting transformation »
- method algorithm »
- java application »
- using algorithm »
-
1
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The experiment contains two phases; first phase was conducted against java applications that do not use any protection to determine the ability of reversing tools to read the compiled code. …”
Get full text
Get full text
Thesis -
2
The implications for ahybrid detection technique against malicious sqlattacks on web applications
Published 2025“…The methodology is based on JavaScript and PHP languages for developing a new technique called DetectCombined capable of filtering queries using parameterized queries to protect against SQL injection which is a safe method. …”
Get full text
Get full text
Get full text
Article -
3
An efficient indexing and retrieval of iris biometrics data using hybrid transform and firefly based K-means algorithm title
Published 2019“…The enhanced method combines three transformation methods for analyzing the iris image and extracting its local features. …”
Get full text
Get full text
Thesis -
4
Diagnosis of diabetic retinopathy: Automatic extraction of optic disc and exudates from retinal images using Marker-controlled watershed transformation
Published 2010“…In this paper, a new algorithm for the extraction of these bright objects from fundus images based on marker-controlled watershed segmentation is presented. …”
Get full text
Article -
5
Extracting fetal electrocardiogram signal using ANFIS trained by genetic algorithm
Published 2012Get full text
Working Paper -
6
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
7
-
8
Fingerprint recognition using neural networks / Kennie Yeoh Eng Hoe
Published 2001“…With tests conducted on the implementation of the Fourier Transform as a method of fingerprint feature extraction, the use of the Fourier Transform was proven not to work. …”
Get full text
Get full text
Thesis -
9
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
10
-
11
-
12
Fatigue Features Extraction of Road Load Time Data Using the S-Transform
Published 2013“…In general, the S-transform (S-T) is a time-frequency spectral localization method which performs a multi-resolution analysis on signal. …”
Get full text
Get full text
Article -
13
Multi road marking detection system for autonomous car using hybrid- based method
Published 2018“…The proposed system consists of a combination of Inverse Perspective Transform method, an image enhancement method and edge detection method. …”
Get full text
Get full text
Get full text
Thesis -
14
COMPUTER AIDED SYSTEM FOR BREAST CANCER DIAGNOSIS USING CURVELET TRANSFORM
Published 2011“…Once the ROI has been identified, an automatic cropping is performed to extract it from the original mammogram. Subsequently, the suggested feature extraction methods were applied to the segmented ROIs. …”
Get full text
Get full text
Thesis -
15
A fingerprint matching algorithm using bit-plane extraction method with phase-only correlation
Published 2017“…This paper introduces a new method in fingerprint feature extraction based on bit-plane. …”
Get full text
Get full text
Get full text
Article -
16
Multispectral palm vein image fusion for contactless palm vein verification system
Published 2018“…The result shows that SIFT algorithm achieved a better recognition rate and extract more information and matching pairs compared to SURF algorithm. …”
Get full text
Get full text
Thesis -
17
Selection, generation and extraction of MCCTree using XMCCTree
Published 2012Get full text
Get full text
Get full text
Article -
18
Image watermarking optimization algorithms in transform domains and feature regions
Published 2012“…As a result,it will first introduce the theories about the feature extraction and the basic principles on how feature points can act as locating resynchronization between watermark insertion and extraction discussed in detail.Subsequently,it will present several content-based watermark embedding and extraction methods which can be directly implemented based on the synchronization scheme.Further detailed watermarking schemes which combine feature regions extraction with counter propagation neural network-based watermarks synapses memorization are then presented.The performance of watermarking schemes based on framework of feature point shows the following advantages:a)Good imperceptibility. …”
Get full text
Get full text
Thesis -
19
Image classification using two dimensional wavelet coefficients with parallel computing
Published 2020“…The low-level features such as edges, blobs, and ridges were extracted for grouping and classification. Object recognition and image classification comes after the wavelet transform. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
20
Real‑time chatter detection during turning operation using wavelet scattering network
Published 2024“…These methods require human expertise for manual feature extraction. …”
Get full text
Get full text
Get full text
Article
