Search Results - (( java implementation developing algorithm ) OR ( pre implementation svm algorithm ))

Refine Results
  1. 1
  2. 2

    Effects of Different Pre-Trained Deep Learning Algorithms as Feature Extractor in Tomato Plant Health Classification by Chong, Hou Ming, Yin Yap, Xien, Seng Chia, Kim

    Published 2023
    “…This study proposes a system that can classify tomato plant health into five categories of healthy, early blight, late blight, bacterial spot, and yellow leaf curl virus based on their leaves using deep learning algorithms as feature extractors. Five different pre-trained deep learning algorithms (i.e. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Effects of Different Pre-Trained Deep Learning Algorithms as Feature Extractor in Tomato Plant Health Classification by Hou Ming Chong, Hou Ming Chong, Xien Yin Yap, Xien Yin Yap, Kim Seng Chia, Kim Seng Chia

    Published 2023
    “…This study proposes a system that can classify tomato plant health into five categories of healthy, early blight, late blight, bacterial spot, and yellow leaf curl virus based on their leaves using deep learning algorithms as feature extractors. Five different pre-trained deep learning algorithms (i.e. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Effects of Different Pre-Trained Deep Learning Algorithms as Feature Extractor in Tomato Plant Health Classification by Hou Ming Chong, Hou Ming Chong, Xien Yin Yap, Xien Yin Yap, Kim Seng Chia, Kim Seng Chia

    Published 2023
    “…This study proposes a system that can classify tomato plant health into five categories of healthy, early blight, late blight, bacterial spot, and yellow leaf curl virus based on their leaves using deep learning algorithms as feature extractors. Five different pre-trained deep learning algorithms (i.e. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Effects of Different Pre-Trained Deep Learning Algorithms as Feature Extractor in Tomato Plant Health Classification by Hou Ming Chong, Hou Ming Chong, Xien Yin Yap, Xien Yin Yap, Kim Seng Chia, Kim Seng Chia

    Published 2023
    “…This study proposes a system that can classify tomato plant health into five categories of healthy, early blight, late blight, bacterial spot, and yellow leaf curl virus based on their leaves using deep learning algorithms as feature extractors. Five different pre-trained deep learning algorithms (i.e. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Prediction of COVID-19 outbbreak using Support Vector Machine / Muhammad Qayyum Mohd Azman by Mohd Azman, Muhammad Qayyum

    Published 2024
    “…In response to the unprecedented challenges posed by the COVID-19 pandemic, this research project presents a systematic approach to outbreak prediction, specifically advocating for the implementation of Support Vector Machine (SVM) algorithms. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Provider independent cryptographic tools by Ibrahim, Subariah, Salleh, Mazleena, Abdul Aziz, Shah Rizan

    Published 2003
    “…The library is implemented by using Java cryptographic service provider framework that conforms to Java Cryptographic Architecture (JCA) and Java Cryptographic Extension (JCE). …”
    Get full text
    Get full text
    Get full text
    Monograph
  8. 8

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…RSA is one of these encryption algorithms that have been implemented in security systems. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Autism Spectrum Disorder Classification Using Deep Learning by Abdulrazak Yahya, Saleh, Lim Huey, Chern

    Published 2021
    “…The CNN algorithm produces better results with an accuracy of 97.07%, compared with the SVM algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Improvement of land cover mapping using Sentinel 2 and Landsat 8 imageries via non-parametric classification by Myaser, Jwan

    Published 2020
    “…The last phase involves developing a new fusion algorithm using SVM and Fuzzy K-Means Clustering (FKM) algorithms for Sentinel 2 data to enhance LCM accuracy. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Classification Of Cervical Cancer Stage From Pap Smear Tests by Sendal, Ken Irok

    Published 2019
    “…The proposed approach will implement stages of image pre-processing, feature selection and extraction as well as classification of classes. …”
    Get full text
    Get full text
    Final Year Project
  14. 14

    Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework by Asaad Aref, Ibrahim

    Published 2004
    “…Java Media Framework library and the RTP protocol for audio transmission were used as development tools.The developed system designed in this thesis together with experimental results proved that the system could be implemented successfully. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Implementation of (AES) Advanced Encryption Standard algorithm in communication application by Moh, Heng Huong

    Published 2014
    “…The aim of the thesis is to provide an overview of the ABS encryptiOn algorithm, to develop a prototype that is implemented for communication purpose, and to test the developed prototype in terms of accuracy purpose. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  16. 16

    A Toolkit for Simulation of Desktop Grid Environment by FOROUSHAN, PAYAM CHINI

    Published 2014
    “…A simulator for desktop grid environment has been developed using Java as the implementation language due to its wide popularity. …”
    Get full text
    Get full text
    Final Year Project
  17. 17

    Automatic Number Plate Recognition on android platform: With some Java code excerpts by ., Abdul Mutholib, Gunawan, Teddy Surya, Kartiwi, Mira

    Published 2016
    “…Performance of the proposed algorithm was evaluated on the developed number plates’ image database captured by mobile phone’s camera, i.e. 30 images. …”
    Get full text
    Get full text
    Get full text
    Book
  18. 18

    Application of genetic algorithm and JFugue in an evolutionary music generator by Tang, Jia Rou

    Published 2025
    “…This project explores the application of Genetic Algorithms (GA) with JFugue, which is a Java-based music programming library to develop an Evolutionary Music Generator. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  19. 19

    Camera Independent Face Recognition Algorithm In Visual Surveillance by Yew, Chuu Tian

    Published 2015
    “…The flandmark facial landmark detector is implemented to determine the location of the eyes and new face images are obtained by cropping the HE pre-processed images. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Automatic Segmentation and Classification of Skin Lesions in Dermoscopic Images by Adil Humayun, Khan

    Published 2024
    “…Statistical techniques such as Anisotropic Diffusion Filter (ADF), local contrast enhancement, and haze reduction in the CIELAB colour space, are incorporated in the proposed algorithms for the pre-processing step. Hair removal is implemented through black-hat morphological processing and total variation based inpainting. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis