Search Results - (( java application testing algorithm ) OR ( features extraction techniques algorithm ))

Refine Results
  1. 1

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…With these parameters it was possible to determine the ability of the proposed technique to defend the attack. The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Detection and extraction features for signatures images via different techniques by Fatma Susilawati, M., Alsuhimat, F.M., Iqtait, M.

    Published 2019
    “…Over time, a number of techniques have been developed to identify and extract a set of features from the signature image. …”
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3
  4. 4

    Register Transfer Level Implementation Of Pooling - Based Feature Extraction For Finger Vein Identification by Mohamed Ali, Mohamed Hassan

    Published 2017
    “…A pooling based feature extraction technique for finger vein identification was implemented in this research. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Feature extraction and selection algorithm based on self adaptive ant colony system for sky image classification by Petwan, Montha

    Published 2023
    “…However, the ACO suffers from premature convergence which leads to poor feature subset. Therefore, an improved feature extraction and selection for sky image classification (FESSIC) algorithm is proposed. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7
  8. 8

    Supervised ANN classification for engineering machined textures based on enhanced features extraction and reduction scheme by Ashour, Mohammed Waleed, Khalid, Fatimah, Al-Obaydee, Mohammed

    Published 2013
    “…In this paper, feature extractions scheme followed by features dimensionality reduction technique is presented for image classification. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    Fuzzy based technique for microchip lead inspection using machine vision by Hawari, Yasser, Salami, Momoh Jimoh Emiyoka, Aburas, Abdurazzag Ali

    Published 2008
    “…Using the features extracted, the algorithm first finds a proper thresholding value. …”
    Get full text
    Get full text
    Proceeding Paper
  10. 10

    Plant leaf recognition algorithm using ant colony-based feature extraction technique by Ghasab, Mohammad Ali Jan

    Published 2013
    “…Moreover, the ant colony optimisation technique be applied as an expert algorithm to make a decision for the selection of optimal features in order to enhance the performance of a classifier for recognition of diverse species of plants. …”
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12
  13. 13
  14. 14
  15. 15

    Non-fiducial based electrocardiogram biometrics with kernel methods by Hejazi, Maryamsadat

    Published 2017
    “…A new non-fiducial approach is proposed for feature extraction. This approach constructs an algorithm by combining autocorrelation (AC) and Kernel Principal Component Analysis (KPCA) techniques. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Facial features point localization using modified SIFT scale space / Zulfikri Paidi by Paidi, Zulfikri

    Published 2020
    “…Surface change creates high-dimensional data during feature extraction work. There are many algorithms proposed for recognition of facial expressions, including SIFT algorithms that are considered superior in performing feature extraction. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Crow Search Freeman Chain Code (CS-FCC) feature extraction algorithm for handwritten character recognition by Muhammad Arif, Mohamad, Zalili, Musa, Amelia Ritahani, Ismail

    Published 2023
    “…In this research, a Crow Search Algorithm (CSA)-based metaheuristic strategy for feature extraction in HCR was developed. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18
  19. 19

    Electroencephalogram-based decoding cognitive states using convolutional neural network and likelihood ratio based score fusion by Zafar, R., Dass, S.C., Malik, A.S.

    Published 2017
    “…The results from the proposed method are compared with current recognized feature extraction and classification/prediction techniques. …”
    Get full text
    Get full text
    Article
  20. 20

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
    Get full text
    Get full text
    Final Year Project