Search Results - (( leaf optimization techniques algorithm ) OR ( java implementation during algorithm ))
Search alternatives:
- optimization techniques »
- implementation during »
- java implementation »
- leaf optimization »
- during algorithm »
-
1
Plant leaf recognition algorithm using ant colony-based feature extraction technique
Published 2013“…Moreover, the ant colony optimisation technique be applied as an expert algorithm to make a decision for the selection of optimal features in order to enhance the performance of a classifier for recognition of diverse species of plants. …”
Get full text
Get full text
Thesis -
2
Pairwise testing tools based on hill climbing algorithm (PTCA)
Published 2014“…The actual implementation of the algorithm which is in Java programming language, the program is implemented on Net Bean 7.0.1. …”
Get full text
Get full text
Undergraduates Project Papers -
3
Image pre-processing algorithm for Ficus deltoidea Jack (Moraceae) varietal recognition: a repeated perpendicular line scanning approach
Published 2018“…Four phases of petiole removal technique involved are: i) binary image enhancement, ii) boundary binary image contour tracing, iii) petiole section scanning, and iv) optimal image size retaining and cropping. …”
Get full text
Get full text
Get full text
Article -
4
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…The circuits have been designed by proteus, the microcontrollers have been programmed by micro C, and the Graphical User Interface (GUI) has been implemented in Java. Few by electronic components such as RFID, multiplexer, XBee, and servo motors have been used to realize the system. …”
Get full text
Get full text
Thesis -
5
Deep plant: A deep learning approach for plant classification / Lee Sue Han
Published 2018“…They look for the procedures or algorithms that maximize the use of leaf databases for plant predictive modelling, but this results in leaf features which are liable to change with different leaf data and feature extraction techniques. …”
Get full text
Get full text
Get full text
Thesis -
6
Comparison of dose calculation algorithms model: convolution, superposition, and fast superposition in 3-D Conformal Radiotherapy (3D-CRT) treatment plan
Published 2019“…In this study, we modified protocols described in IAEATecdoc-1583, where four typical treatment techniques such as single field, multiple field, wedge field, and multi-leaf collimated (MLC) field were analysed from the system. …”
Get full text
Get full text
Get full text
Article -
7
Talkout : Protecting mental health application with a lightweight message encryption
Published 2022“…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
Get full text
Get full text
Get full text
Academic Exercise -
8
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…The system is capable in operating an off-line programming method, starting from its programming sequences until robotic implementation of the program. During early stages, the research is emphasis more towards designing a robotic system using RoboLab software and C++ programming language. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
9
Data Hiding Techniques In Digital Images
Published 2003“…After all these studies, one of the algorithms in the masking technique is developed and implemented using JAVA program to embed message into true color image with a good quality and higher capacity. …”
Get full text
Get full text
Thesis -
10
Multi-floor indoor location estimation system based on wireless local area network
Published 2007“…Before developing the system, study on characteristics of RSS is conducted to help the design, development and implementation of the proposed system. The proposed system is then designed and developed using Java programming language. …”
Get full text
Get full text
Thesis -
11
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis -
12
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis -
13
Human activity recognition via accelerometer and gyro sensors
Published 2023“…To prevent overfitting, early stopping is used to monitor validation loss during training and dropout rate of 0.3 are applied. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
14
Introducing new statistical shape based and texture feature extraction methods in the plant species recognition system
Published 2013“…Usually shape and texture based techniques are used at the same time in object recognition problems. …”
Get full text
Get full text
Get full text
Article -
15
Anfis Modelling On Diabetic Ketoacidosis For Unrestricted Food Intake Conditions
Published 2017“…The project has also implemented the optimization process onto the proposed ANFIS model through the hybrid of Genetic Algorithm on the fuzzy membership function of the ANFIS model. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
16
Evaluation of multiple In Situ and remote sensing system for early detection of Ganoderma boninense infected oil palm
Published 2018“…During the field experiments, leaf samples of healthy (T1), mildly (T2), moderately (T3) and severely-infected (T4) palms were measured using a Minolta SPAD-502 chlorophyll meter and a SC-1 leaf Porometer to obtain relative leaf chlorophyll content and stomatal conductance, respectively. …”
Get full text
Get full text
Get full text
Thesis -
17
Evolutionary cost-cognizant regression test case prioritization for object-oriented programs
Published 2019“…To improve the rate of fault detection during several TCP approaches are proposed for regression testing. …”
Get full text
Get full text
Thesis
