Search Results - (( shape classification system algorithm ) OR ( java implementation models algorithm ))

Refine Results
  1. 1

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…RSA is one of these encryption algorithms that have been implemented in security systems. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Automated plant classification system using a hybrid of shape and color features of the leaf by Hamid, Laith Emad

    Published 2016
    “…An Automated Plant Classification System (APCS) is introduced in this thesis to overcome the aforementioned limitations by proposing an automated alignment algorithm to eliminate the need for human intervention to align the leaf. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Provider independent cryptographic tools by Ibrahim, Subariah, Salleh, Mazleena, Abdul Aziz, Shah Rizan

    Published 2003
    “…The library is implemented by using Java cryptographic service provider framework that conforms to Java Cryptographic Architecture (JCA) and Java Cryptographic Extension (JCE). …”
    Get full text
    Get full text
    Get full text
    Monograph
  4. 4

    Automated plant recognition system based on multi-objective parallel genetic algorithm and neural network by Sefidgar, Seyed Mohammad Hossein

    Published 2014
    “…This method resulted around 99% of classification rate. To conclude, multi objective parallel genetic algorithm can automatically tune feed forward neural network to classify the dataset with a good classification rate.…”
    Get full text
    Get full text
    Thesis
  5. 5

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  6. 6

    A preliminary study on automated freshwater algae recognition and classification system / Hayat Mansoor Abdullah by Mansoor Abdullah, Hayat

    Published 2012
    “…Shape index techniques are also considered a novel techniques developed to assist system in classification of algae based on their biological metrics and taxonomy. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Automated leaf alignment and partial shape feature extraction for plant leaf classification by Hamid, Laith Emad, Syed Mohamed, Syed Abdul Rahman Al-Haddad

    Published 2019
    “…The well-known Flavia dataset has been selected for the evaluation of the proposed system. The experimental results indicate the ability of the proposed alignment algorithm to align leaves with different shapes and maintain a correct classification accuracy regardless of the orientation of the input leaf samples. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    An Ar Natural Marker Similarities Measurement Algorithm For E-Biodiversity by Tan, Mei Synn, Wang, Yin Chai

    Published 2018
    “…Algorithms of investigation starting with span from extraction, matching and classification to determine the interest point of flower species, like colour and shape features information. …”
    Get full text
    Get full text
    Proceeding
  9. 9
  10. 10

    Optimization of blood vessel detection in retina images using multithreading and native code for portable devices by Tran, Duc Ngoc, Hussin, Fawnizu Azmadi, Yusoff, Mohd Zuki

    Published 2013
    “…The performance of Java programming model and native programming model are compared with respect to the execution time for blood vessel detection. …”
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    A Toolkit for Simulation of Desktop Grid Environment by FOROUSHAN, PAYAM CHINI

    Published 2014
    “…A simulator for desktop grid environment has been developed using Java as the implementation language due to its wide popularity. …”
    Get full text
    Get full text
    Final Year Project
  12. 12

    Application Of Neural Network In Malaria Parasites Classification by Lim, Chia Li

    Published 2006
    “…In the second stage, comparison will be done on the performance of neural networks developed to yield the best neural network and malaria parasites classification system will be developed using Borland C++ Builder. …”
    Get full text
    Get full text
    Monograph
  13. 13
  14. 14
  15. 15

    Passive forward scatter radar based on LTE signal for vehicle detection and classification by Abdul Aziz, Noor Hafizah

    Published 2018
    “…The Doppler spectrum scattered by the vehicle is used as the features for input to the classification system. The classification algorithm was developed based on Principal Component Analysis (PCA) and k-Nearest Neighbours (k-NN). …”
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17

    A Model for Evaluation of Cryptography Algorithm on UUM Portal by Norliana, Abdul Majid

    Published 2004
    “…The methodology used in this study begun with problem identification, requirement identification, analysed the model process and design the simulation model. The simulation model was developed using Active Server Page, JavaScript and SQL 7.0 as database. …”
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    Enhanced Image Classification for Defect Detection on Solar Photovoltaic Modules by Wiliani, Ninuk

    Published 2023
    “…On the surface of the photovoltaic modules, solar cell defects are identified based on cell shapes and textures. However, high similarity of characteristics among the shapes and textures has been a major challenge in defect classification process. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20