Search Results - (( java applications security algorithm ) OR ( problem segmentation learning algorithm ))

Refine Results
  1. 1
  2. 2

    Harmony Search-Based Fuzzy Clustering Algorithms For Image Segmentation by Alia, Osama Moh’d Radi

    Published 2011
    “…These algorithms have been applied to the problem of image segmentation. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    SANAsms: Secure short messaging system for secure GSM mobile communication by Anuar, N.B., Azlan, I.M., Wahid, A.W.A., Zakaria, O.

    Published 2008
    “…J2ME phone and Symbian Operating System (OS) as the platform for the application to run. The encryption algorithm that implemented in the system is Advanced Encryption Standard (AES) with 128-bit block size and together with the SHA1 (Secure Hash Algorithm) hash functions. …”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Edge detection and contour segmentation for fruit classification in natural environment / Khairul Adilah Ahmad by Ahmad, Khairul Adilah

    Published 2018
    “…This learning algorithm represents an automatic generation of membership functions and rules from the data. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Automated visual defect detection using deep learning by Loh, Xiao

    Published 2022
    “…The main goal of this project is to study and develop various automated defect detection models by utilizing state-of-the-art deep learning segmentation algorithms, including U-Net, Double U-Net, SETR, TransU-Net, TransDAU-Net, CAM and SEAM to perform semantic segmentation in fully supervised and weakly supervised learning manners. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  7. 7

    Old Jawi manuscript: Digital recognition / Zaidi Razak by Zaidi, Razak

    Published 2016
    “…The literature review in this research looks at works conducted in the past on line and character segmentation as well as recognition systems. The information gathered is useful for the development of a line segmentation algorithm, a new character segmentation algorithm, as well as a recognition algorithm which is based on the use of a unique code and Hamming distance calculation. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Implementation of (AES) Advanced Encryption Standard algorithm in communication application by Moh, Heng Huong

    Published 2014
    “…Internet communication has become more common in this modern world recently, and one of the important algorithms used is ABS algorithm. However, most of the users have inadequate knowledge and understanding regard to this algorithm implementation in the communication field, as well as the level of security and accuracy will be questioned by the users because of the necessary to maintain the confidentiality of particular data transferred. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  9. 9

    Micro-Crack Detection Of Solar Cells Featuring Adaptive Anisotropic Diffusion Filter And Semi-Supervised Support Vector Learning by Majid, Said Amirul Anwar B Ab Hamid @ Ab

    Published 2014
    “…The outcomes of this algorithm have demonstrated a highly accurate segmentation results compared to other standard methods. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Encrypted mobile messaging application using AES block cipher cryptography algorithm / Nur Rasyiqah Zulkifli by Zulkifli, Nur Rasyiqah

    Published 2019
    “…This project focuses on securing the messages from the intruders. Nowadays, people mostly use mobile application to communicate with each other. …”
    Get full text
    Get full text
    Student Project
  11. 11

    Cooperative spectrum sensing based on machine learning in cognitive radio vehicular network / Mohammad Asif Hossain by Mohammad Asif , Hossain

    Published 2022
    “…The tri-agent reinforcement learning (TA-RL) algorithm has been used by the segment spectrum agent (SSA) in this suggested CSS to make the global decision. …”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    A hyper-heuristic based strategy for image segmentation using multilevel thresholding by Luqman, Fakhrud Din, Shah Khalid, Kamal Zuhairi Zamli, Aftab Alam

    Published 2025
    “…EMCQ uses four low-level heuristic sets adopted from the teaching learning-based optimisation (TLBO) algorithm, flower pollination algorithm (FPA), genetic algorithm (GA), and Jaya algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13
  14. 14
  15. 15

    A hyper-heuristic based strategy for image segmentation using multilevel thresholding by Luqman, ., Fakhrud, Din, Shah, Khalid, Kamal Z., Zamli, Alam, Aftab

    Published 2025
    “…EMCQ uses four low-level heuristic sets adopted from the teaching learning-based optimisation (TLBO) algorithm, flower pollination algorithm (FPA), genetic algorithm (GA), and Jaya algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Enhanced Deep Learning Framework for Fine-Grained Segmentation of Fashion and Apparel by Usmani, U.A., Happonen, A., Watada, J.

    Published 2022
    “…This work proposes a deep learning framework that can learn how to detect and segment clothing objects accurately. …”
    Get full text
    Get full text
    Article
  17. 17

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…A GUI is created in a form of JAVA application to display data detected from tag. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Automatic generation of content security policy to mitigate cross site scripting by Mhana, Samer Attallah, Din, Jamilah, Atan, Rodziah

    Published 2016
    “…The algorithm is implemented as a plugin. It does not interfere with the web application original code. …”
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19

    Secure scheme for user authentication and authorization in android environment by Dar, Humaira, Al-Khateeb, Wajdi Fawzi Mohammed, Habaebi, Mohamed Hadi

    Published 2013
    “…Providing ultimate security in sensitive transaction and communication of online premium application is still a question mark of standardization in the area of networking and security. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Fostering motivation in TVET students: the role of learner-paced segments and computational thinking in digital video learning by Wan Nor Ashiqin Wan Ali, Wan Ahmad Jaafar Wan Yahaya, Syed Zulkarnain Syed Idrus, Mohd Noorul Fakhri Yaacob

    Published 2024
    “…This study aims to address this gap by examining how learner-paced predefined segments and CT algorithmic thinking can impact TVET students' perceived motivation. …”
    Get full text
    Get full text
    Get full text
    Article