Search Results - (( programming features extraction algorithm ) OR ( java application testing algorithm ))
Search alternatives:
- programming features »
- extraction algorithm »
- features extraction »
- application testing »
- testing algorithm »
- java application »
-
1
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…An attacker can easily reconstruct source code from such intermediate formats to extract sensitive information such as proprietary algorithms present in the software. …”
Get full text
Get full text
Thesis -
2
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
3
-
4
Handwriting recognition using webcam for data entry
Published 2014“…The outcome of the project should be able to obtain a system that is able to recognize handwritten numerical data with the lowest overshoot and errors. Several distinctive feature from each character is extracted using a few feature extraction methods, in which a comparison between three types of feature extraction modules were used. …”
Get full text
Get full text
Final Year Project -
5
Building extraction of worldview3 imagery via support vector machine using scikit-learn module / Najihah Ismail
Published 2021“…Moreover, the capability of the programming based using python for building extraction can be assessed. …”
Get full text
Get full text
Thesis -
6
Agent-based extraction algorithm for computational problem solving
Published 2015“…The results show that the extraction algorithm has been able to extract 100 % of the information correctly. …”
Get full text
Get full text
Thesis -
7
-
8
Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application
Published 2020“…Performance Testing is used to test the performance of algorithm implementations in applications. …”
Get full text
Get full text
Journal -
9
Handwriting recognition using webcam for data entry
Published 2015“…Further feature extraction modules are being recommended and an additional feature extraction module was added for the third test, which successfully yields 90.67. …”
Get full text
Get full text
Conference or Workshop Item -
10
NN with DTW-FF Coefficients and Pitch Feature for Speaker Recognition
Published 2006“…This paper proposes a new method to extract speech features in a warping path using dynamic programming (DP). …”
Get full text
Get full text
Article -
11
Long-term electrical energy consumption: Formulating and forecasting via optimized gene expression programming / Seyed Hamidreza Aghay Kaboli
Published 2018“…In the developed feature selection approach, multi-objective binary-valued backtracking search algorithm (MOBBSA) is used as an efficient evolutionary search algorithm to search within different combinations of input variables and selects the non-dominated feature subsets, which minimize simultaneously both the estimation error and the number of features. …”
Get full text
Get full text
Get full text
Thesis -
12
Assessment of crops healthiness via deep learning approach: Python / Mohamad Amirul Asyraf Mohd Ramli
Published 2023“…By leveraging image processing techniques, statistical analysis and machine learning algorithms, Python enables the extraction of relevant features and patterns from data. …”
Get full text
Get full text
Student Project -
13
Improved ADALINE harmonics extraction algorithm for boosting performance of photovoltaic shunt active power filter under dynamic operations
Published 2016“…For hardware implementation, laboratory prototype has been developed and the proposed algorithm was programmed in TMS320F28335 DSP board. …”
Get full text
Get full text
Get full text
Article -
14
Improved ADALINE Harmonics Extraction Algorithm for Boosting Performance of Photovoltaic Shunt Active Power Filter under Dynamic Operations
Published 2016“…For hardware implementation, laboratory prototype has been developed and the proposed algorithm was programmed in TMS320F28335 DSP board. …”
Get full text
Get full text
Article -
15
-
16
A stylometry approach for blind linguistic steganalysis model against translation-based steganography
Published 2023“…While targeted steganalysis is designed to attack a specific embedding algorithm, blind steganalysis use features extracted or selection from the medium to detect any anomalies that indicate a possibility that a secret data has been embedded within the medium. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
17
Image classification using two dimensional wavelet coefficients with parallel computing
Published 2020“…The low-level features such as edges, blobs, and ridges were extracted for grouping and classification. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
18
-
19
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…The concept of ABS algorithm was firstly studied, including the definition, historical background, and a brief comparison was made between the ABS algorithm with other types of algorithm. …”
Get full text
Get full text
Undergraduates Project Papers -
20
Flock optimization algorithm-based deep learning model for diabetic disease detection improvement
Published 2024“…The existing systems face data over-fitting issues, convergence problems, non-converging optimization complex predictions, and latent and predominant feature extraction. These issues affect the system's performance and reduce diabetic disease detection accuracy. …”
Get full text
Get full text
Article
