Search Results - (( java application customization algorithm ) OR ( leaf optimization technique algorithm ))

  • Showing 1 - 8 results of 8
Refine Results
  1. 1

    Plant leaf recognition algorithm using ant colony-based feature extraction technique by Ghasab, Mohammad Ali Jan

    Published 2013
    “…Moreover, the ant colony optimisation technique be applied as an expert algorithm to make a decision for the selection of optimal features in order to enhance the performance of a classifier for recognition of diverse species of plants. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Image pre-processing algorithm for Ficus deltoidea Jack (Moraceae) varietal recognition: a repeated perpendicular line scanning approach by Ahmad Fakhri, Ab. Nasir, M Nordin, A Rahman, Nashriyah, Mat, Abd Rasid, Mamat, Ahmad Shahrizan, Abdul Ghani

    Published 2018
    “…Four phases of petiole removal technique involved are: i) binary image enhancement, ii) boundary binary image contour tracing, iii) petiole section scanning, and iv) optimal image size retaining and cropping. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Deep plant: A deep learning approach for plant classification / Lee Sue Han by Lee , Sue Han

    Published 2018
    “…They look for the procedures or algorithms that maximize the use of leaf databases for plant predictive modelling, but this results in leaf features which are liable to change with different leaf data and feature extraction techniques. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    Comparison of dose calculation algorithms model: convolution, superposition, and fast superposition in 3-D Conformal Radiotherapy (3D-CRT) treatment plan by Murat, Husain, Abdul Karim, Muhammad Khalis, Haspiharun, Hanif, Kayun, Zunaide

    Published 2019
    “…In this study, we modified protocols described in IAEATecdoc-1583, where four typical treatment techniques such as single field, multiple field, wedge field, and multi-leaf collimated (MLC) field were analysed from the system. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    Design & Development of a Robotic System Using LEGO Mindstorm by Abd Manap, Nurulfajar, Md Salim, Sani Irwan, Haron, Nor Zaidi

    Published 2006
    “…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    Evaluation of multiple In Situ and remote sensing system for early detection of Ganoderma boninense infected oil palm by Ahmadi, Seyedeh Parisa

    Published 2018
    “…During the field experiments, leaf samples of healthy (T1), mildly (T2), moderately (T3) and severely-infected (T4) palms were measured using a Minolta SPAD-502 chlorophyll meter and a SC-1 leaf Porometer to obtain relative leaf chlorophyll content and stomatal conductance, respectively. …”
    Get full text
    Get full text
    Get full text
    Thesis