Search Results - (( leaf optimization based algorithm ) OR ( java data protection algorithm ))
Search alternatives:
- protection algorithm »
- leaf optimization »
- java »
-
1
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…The encryption algorithms are playing an important part in the protection level for data. …”
Get full text
Get full text
Thesis -
2
Automated plant classification system using a hybrid of shape and color features of the leaf
Published 2016“…Automated plant leaf classification is a computerized approach that employs computer vision and machine learning algorithms to identify a plant based on the features of its leaf. …”
Get full text
Get full text
Thesis -
3
Feature decision-making ant colony optimization system for an automated recognition of plant species
Published 2015“…In the present paper, an expert system for automatic recognition of different plant species through their leaf images is investigated by employing the ant colony optimization (ACO) as a feature decision-making algorithm. …”
Get full text
Get full text
Get full text
Article -
4
Plant leaf recognition algorithm using ant colony-based feature extraction technique
Published 2013“…Then, based on the characteristics of each species, decision making is done by means of ant colony optimisation as a search algorithm to return the optimal subset of features regarding the related species. …”
Get full text
Get full text
Thesis -
5
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
Get full text
Get full text
Thesis -
6
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
Get full text
Get full text
Conference or Workshop Item -
7
Security Analysis Between Static And Dynamic S-boxes In Block Ciphers
Published 2024Get full text
Article -
8
Securing cloud data system (SCDS) for key exposure using AES algorithm
Published 2021“…The AES algorithm has its own structure to encrypt and decrypt sensitive data that make the attackers difficult to get the real data when encrypting by AES algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
9
Plant identification using combination of fuzzy c-means spatial pyramid matching, gist, multi-texton histogram and multiview dictionary learning
Published 2016“…Second one is gist from global features of leaf images. gist descriptor is based on spatial layout of colors, orientation and principal texture. …”
Get full text
Get full text
Thesis -
10
Deep plant: A deep learning approach for plant classification / Lee Sue Han
Published 2018“…They look for the procedures or algorithms that maximize the use of leaf databases for plant predictive modelling, but this results in leaf features which are liable to change with different leaf data and feature extraction techniques. …”
Get full text
Get full text
Get full text
Thesis -
11
Data Hiding Techniques In Digital Images
Published 2003“…Hiding data provides a good layer of protection on the secret message, so the purpose of this thesis is to study the data hiding techniques in digital images as a new and powerful technology capable of solving important practical problems. …”
Get full text
Get full text
Thesis -
12
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
13
-
14
The implications for ahybrid detection technique against malicious sqlattacks on web applications
Published 2025“…The methodology is based on JavaScript and PHP languages for developing a new technique called DetectCombined capable of filtering queries using parameterized queries to protect against SQL injection which is a safe method. …”
Get full text
Get full text
Get full text
Article -
15
Predicting the optimum compositions of a transdermal nanoemulsion system containing an extract of Clinacanthus nutans leaves (L.) for skin antiaging by artificial neural network mo...
Published 2017“…A nanoemulsion-based formulation containing leaf extracts of Clinacanthus nutans Lindau (C. nutans) was prepared for therapeutic use and optimized by artificial neural network (ANN). …”
Get full text
Get full text
Get full text
Article -
16
Image pre-processing algorithm for Ficus deltoidea Jack (Moraceae) varietal recognition: a repeated perpendicular line scanning approach
Published 2018“…Some of researchers have developed the image pre-processing algorithm to remove petiole section. However, the algorithm was developed using semi-automatic algorithm which is strongly believed to give an inaccurate feature measurement. …”
Get full text
Get full text
Get full text
Article -
17
Fuzzy-based multi-agent approach for reliability assessment and improvement of power system protection
Published 2015“…The simulation results for the first and second models are done using the data obtained from Malaysia distribution network (DISCO-Net) and 69 bus test system that were implemented using Java Agent Development Framework package software. …”
Get full text
Get full text
Thesis -
18
Introducing new statistical shape based and texture feature extraction methods in the plant species recognition system
Published 2013“…Usually shape and texture based techniques are used at the same time in object recognition problems. …”
Get full text
Get full text
Get full text
Article -
19
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis -
20
