Search Results - (( using iris optimization algorithm ) OR ( java application testing algorithm ))

Refine Results
  1. 1

    Black hole algorithm along edge detector and circular hough transform based iris projection with biometric identification systems by Tara Othman Qadir, Tara Othman Qadir, N.S.A.M Taujuddin, N.S.A.M Taujuddin

    Published 2024
    “…In this study, we presented a Black Hole Algorithm (BHA) along the Canny edge detector and circular Hough transform-based optimization technique for circular parameter identification of iris segmentation. …”
    Get full text
    Get full text
    Article
  2. 2

    An efficient indexing and retrieval of iris biometrics data using hybrid transform and firefly based K-means algorithm title by Khalaf, Emad Taha

    Published 2019
    “…The enhanced method combines three transformation methods for analyzing the iris image and extracting its local features. It uses a weighted K-means clustering algorithm based on the improved FA to optimize the initial clustering centers of K-means algorithm, known as Weighted K-means clustering-Improved Firefly Algorithm (WKIFA). …”
    Get full text
    Get full text
    Thesis
  3. 3

    Efficient classifying and indexing for large iris database based on enhanced clustering method by Khalaf, Emad Taha, Mohammed, Muamer N., Kohbalan, Moorthy, Khalaf, Ahmad Taha

    Published 2018
    “…In the current work, the new Weighted K-means algorithm based on the Improved Firefly Algorithm (WKIFA) has been used to overcome the shortcomings in using the Fireflies Algorithm (FA). …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Furrow and crypt detection using modified ant colony optimization for iris recognition / Zaheera Zainal Abidin by Zainal Abidin, Zaheera

    Published 2016
    “…As a solution, to improve the accuracy performance, this research proposes a new approach called as Modified Ant Colony Optimization that uses ant colony algorithm which search for crypts and radial furrow. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Furrow and crypt detection using Modified Ant Colony Optimization for iris recognition / Zaheera Zainal Abidin by Zainal Abidin, Zaheera

    Published 2016
    “…As a solution, to improve the accuracy performance, this research proposes a new approach called as Modified Ant Colony Optimization that uses ant colony algorithm which search for crypts and radial furrow. …”
    Get full text
    Get full text
    Book Section
  6. 6
  7. 7

    A new model for iris data set classification based on linear support vector machine parameter's optimization by Faiz Hussain, Zahraa, Ibraheem, Hind Raad, Alsajri, Mohammad, Ali, Ahmed Hussein, Mohd Arfian, Ismail, Shahreen, Kasim, Sutikno, Tole

    Published 2020
    “…In this study, we proposed a newly mode for classifying iris data set using SVM classifier and genetic algorithm to optimize c and gamma parameters of linear SVM, in addition principle components analysis (PCA) algorithm was use for features reduction.…”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Biometric identification and recognition for iris using failure rejection rate (FRR) / Musab A. M. Ali by M. Ali, Musab A.

    Published 2016
    “…Next, select smaller yet optimal and effective normalized iris image size by applying different normalization factors. …”
    Get full text
    Get full text
    Thesis
  9. 9

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
    Get full text
    Get full text
    Final Year Project
  10. 10
  11. 11

    Detection of corneal arcus using rubber sheet and machine learning methods by Ramlee, Ridza Azri

    Published 2019
    “…The benchmark of the classification algorithm for CA is needed to analyze the optimal output of the algorithm. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Urban connected vehicle lane planning based on improved Frank Wolfe algorithm by Anqi, Jiang, Faziawati, Abdul Aziz, Norsidah, Ujang, Mohd Afzan, Mohamed

    Published 2025
    “…The results showed that the accuracy and recall of the proposed improved whale optimization algorithm on the Iris dataset were 95.27% and 92.65%, respectively, which were superior to traditional whale optimization algorithm, moth flame optimization algorithm, moth flame optimization algorithm combined with chaos strategy, and adaptive firefly optimization algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Improvement of fuzzy neural network using mine blast algorithm for classification of Malaysian Small Medium Enterprises based on strength by Hussain Talpur, Kashif

    Published 2015
    “…Many researchers have trained ANFIS parameters using metaheuristic algorithms but very few have considered optimizing the ANFIS rule-base. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application by Yana Aditia, Gerhana, Nur, Lukman, Arief Fatchul, Huda, Cecep Nurul, Alam, Undang, Syaripudin, Devi, Novitasari

    Published 2020
    “…Performance Testing is used to test the performance of algorithm implementations in applications. …”
    Get full text
    Get full text
    Journal
  15. 15
  16. 16

    Implementation of (AES) Advanced Encryption Standard algorithm in communication application by Moh, Heng Huong

    Published 2014
    “…The concept of ABS algorithm was firstly studied, including the definition, historical background, and a brief comparison was made between the ABS algorithm with other types of algorithm. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  17. 17

    Classification System for Heart Disease Using Bayesian Classifier by Magendram, Anusha

    Published 2007
    “…This system was developing base on to three main part which is data processing, testing and implementation of the algorithm. In this system a Bayesian algorithm was used in order to implement the system. …”
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19
  20. 20

    Encrypted mobile messaging application using AES block cipher cryptography algorithm / Nur Rasyiqah Zulkifli by Zulkifli, Nur Rasyiqah

    Published 2019
    “…The programming language that is used to write the program is Java Language that will run on android phones. As the result, this project was tested on the functionality of the mobile messaging application. …”
    Get full text
    Get full text
    Student Project