Search Results - (( java implementation level algorithm ) OR ( program image classification algorithm ))
Search alternatives:
- implementation level »
- image classification »
- java implementation »
- level algorithm »
- program image »
-
1
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…The encryption algorithms are playing an important part in the protection level for data. …”
Get full text
Get full text
Thesis -
2
Image classification using two dimensional wavelet coefficients with parallel computing
Published 2020“…The low-level features such as edges, blobs, and ridges were extracted for grouping and classification. Object recognition and image classification comes after the wavelet transform. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
3
-
4
Developing and validating a simulation model for counting and classification of vehicles
Published 2016“…An algorithm system approach has been presented for extracting traffic data using video image processing. …”
Get full text
Get full text
Get full text
Article -
5
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…Internet communication has become more common in this modern world recently, and one of the important algorithms used is ABS algorithm. However, most of the users have inadequate knowledge and understanding regard to this algorithm implementation in the communication field, as well as the level of security and accuracy will be questioned by the users because of the necessary to maintain the confidentiality of particular data transferred. …”
Get full text
Get full text
Undergraduates Project Papers -
6
-
7
-
8
Use of hybrid classification algorithm for land use and land cover analysis in data scarce environment
Published 2013“…All images were geometrically corrected and projected to UTM, Datum WGS_84 and Zone 38N using automatic image to image registration with polynomial transformation equations and a nearest neighbor re-sampling algorithm. …”
Get full text
Get full text
Thesis -
9
Implementation of locust inspired scheduling algorithm with huge number of servers for energy efficiency in a cloud datacenter
Published 2019“…It does not consider the LACE algorithm implemented in huge number of server in one Cloud datacenter. …”
Get full text
Get full text
Thesis -
10
Design and Development of Artificial Intelligence (Al)-Based Desicion Support System For Manufacturing Applications
Published 2016“…In this report, the research on welding defect detection and classification using radiograph images is presented. …”
Get full text
Monograph -
11
Building extraction of worldview3 imagery via support vector machine using scikit-learn module / Najihah Ismail
Published 2021“…A Commercial Remote Sensing Technology (ENVI) was used and measured to improve and verify the performance of the Python programming-based picture classification by applying the same SVM algorithm and the tests indicated 95.0732% for an overall accuracy.…”
Get full text
Get full text
Thesis -
12
Analysis Of Personal Protective Equipment Classification Method Using Deep Learning
Published 2022“…Based on the result, CNN algorithm is a good algorithm as the binary classification of PPE achieved high accuracy result.…”
Get full text
Get full text
Undergraduates Project Papers -
13
A new classifier based on combination of genetic programming and support vector machine in solving imbalanced classification problem
Published 2016“…There are two methods in dealing with imbalanced classification problem, which are based on data or algorithmic level. …”
Get full text
Get full text
Get full text
Thesis -
14
A Model for Evaluation of Cryptography Algorithm on UUM Portal
Published 2004“…Level one is the development of userID and password, level two involve the insertion of the testing parameter speed coding. …”
Get full text
Get full text
Get full text
Thesis -
15
Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application
Published 2020“…Performance Testing is used to test the performance of algorithm implementations in applications. The test results show that the Boyer Moore and Knuth Morris Pratt algorithms have an accuracy rate of 100%, and the Horspool algorithm 85.3%. …”
Get full text
Get full text
Journal -
16
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…We use a parallel technique that divides RSA power process into seperate threads and employs the use of Chinese Remainder Theorem (CRT) to decrease the time required for both encryption and decryption operation. Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
17
-
18
-
19
Leaf condition analysis using convolutional neural network and vision transformer
Published 2024“…Many botanists and domain experts research various ways to prevent plants from getting infected and preserve their quality using computer vision and image processing integration on leaf images. The quality of the image collection provides a substantial value for the classification model in identifying leaf diseases. …”
Get full text
Get full text
Get full text
Article -
20
Automated pavement imaging program (APIP) for pavement cracks classification and quantification – a photogrammetric approach
Published 2008Get full text
Get full text
Get full text
Conference or Workshop Item
