Search Results - (( java application matching algorithm ) OR ( leaf optimization techniques algorithm ))
Search alternatives:
- optimization techniques »
- application matching »
- leaf optimization »
- java application »
-
1
-
2
Plant leaf recognition algorithm using ant colony-based feature extraction technique
Published 2013“…Moreover, the ant colony optimisation technique be applied as an expert algorithm to make a decision for the selection of optimal features in order to enhance the performance of a classifier for recognition of diverse species of plants. …”
Get full text
Get full text
Thesis -
3
-
4
Image pre-processing algorithm for Ficus deltoidea Jack (Moraceae) varietal recognition: a repeated perpendicular line scanning approach
Published 2018“…Four phases of petiole removal technique involved are: i) binary image enhancement, ii) boundary binary image contour tracing, iii) petiole section scanning, and iv) optimal image size retaining and cropping. …”
Get full text
Get full text
Get full text
Article -
5
Deep plant: A deep learning approach for plant classification / Lee Sue Han
Published 2018“…They look for the procedures or algorithms that maximize the use of leaf databases for plant predictive modelling, but this results in leaf features which are liable to change with different leaf data and feature extraction techniques. …”
Get full text
Get full text
Get full text
Thesis -
6
-
7
Comparison of dose calculation algorithms model: convolution, superposition, and fast superposition in 3-D Conformal Radiotherapy (3D-CRT) treatment plan
Published 2019“…In this study, we modified protocols described in IAEATecdoc-1583, where four typical treatment techniques such as single field, multiple field, wedge field, and multi-leaf collimated (MLC) field were analysed from the system. …”
Get full text
Get full text
Get full text
Article -
8
Message based random variable length key encryption algorithm.
Published 2009Get full text
Get full text
Article -
9
Securing cloud data system (SCDS) for key exposure using AES algorithm
Published 2021“…The AES algorithm has its own structure to encrypt and decrypt sensitive data that make the attackers difficult to get the real data when encrypting by AES algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
10
-
11
Introducing new statistical shape based and texture feature extraction methods in the plant species recognition system
Published 2013“…Usually shape and texture based techniques are used at the same time in object recognition problems. …”
Get full text
Get full text
Get full text
Article -
12
An Agent-Based System with Personalization and Intelligent Assistance Services for Facilitating Knowledge Sharing
Published 2006“…The main algorithms used are profile determination and user similarity. …”
Get full text
Get full text
Thesis -
13
Evaluation of multiple In Situ and remote sensing system for early detection of Ganoderma boninense infected oil palm
Published 2018“…During the field experiments, leaf samples of healthy (T1), mildly (T2), moderately (T3) and severely-infected (T4) palms were measured using a Minolta SPAD-502 chlorophyll meter and a SC-1 leaf Porometer to obtain relative leaf chlorophyll content and stomatal conductance, respectively. …”
Get full text
Get full text
Get full text
Thesis
