Search Results - (( java application testing algorithm ) OR ( parameter extraction matching algorithm ))

Refine Results
  1. 1

    A Comparative Analysis of Feature Extraction Algorithms for Augmented Reality Applications by Alam, Mir Suhail, Morshidi, Malik Arman, Gunawan, Teddy Surya, Olanrewaju, Rashidah Funke

    Published 2021
    “…Feature extraction and matching algorithms are used in many computer vision problems, including object recognition and structure from motion. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  2. 2

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
    Get full text
    Get full text
    Final Year Project
  3. 3
  4. 4

    Heuristic optimization-based wave kernel descriptor for deformable 3D shape matching and retrieval by Naffouti, S.E., Fougerolle, Y., Aouissaoui, I., Sakly, A., Mériaudeau, F.

    Published 2018
    “…In order to circumvent a purely arbitrary choice of the internal parameters of the WKS algorithm, we present a four-step feature descriptor framework in an effort to further improve the classical wave kernel signature (WKS) by acting on its variance parameter. …”
    Get full text
    Get full text
    Article
  5. 5

    Heuristic optimization-based wave kernel descriptor for deformable 3D shape matching and retrieval by Naffouti, S.E., Fougerolle, Y., Aouissaoui, I., Sakly, A., Mériaudeau, F.

    Published 2018
    “…In order to circumvent a purely arbitrary choice of the internal parameters of the WKS algorithm, we present a four-step feature descriptor framework in an effort to further improve the classical wave kernel signature (WKS) by acting on its variance parameter. …”
    Get full text
    Get full text
    Article
  6. 6

    Improved SIFT algorithm for place categorization by Said, Yunusa Ali, Marhaban, Mohammad Hamiruce, Ahmad, Siti Anom, Ramli, Abd Rahman

    Published 2015
    “…Tradeoff between key points and processing time on feature extraction has been used. Selected parameters used in the experiment demonstrated that the computational cost of SIFT in feature extraction can be reduced to half. …”
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7
  8. 8

    An Ar Natural Marker Similarities Measurement Algorithm For E-Biodiversity by Tan, Mei Synn, Wang, Yin Chai

    Published 2018
    “…Algorithms of investigation starting with span from extraction, matching and classification to determine the interest point of flower species, like colour and shape features information. …”
    Get full text
    Get full text
    Proceeding
  9. 9

    Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application by Yana Aditia, Gerhana, Nur, Lukman, Arief Fatchul, Huda, Cecep Nurul, Alam, Undang, Syaripudin, Devi, Novitasari

    Published 2020
    “…Performance Testing is used to test the performance of algorithm implementations in applications. …”
    Get full text
    Get full text
    Journal
  10. 10
  11. 11
  12. 12

    Implementation of (AES) Advanced Encryption Standard algorithm in communication application by Moh, Heng Huong

    Published 2014
    “…The concept of ABS algorithm was firstly studied, including the definition, historical background, and a brief comparison was made between the ABS algorithm with other types of algorithm. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  13. 13

    Classification System for Heart Disease Using Bayesian Classifier by Magendram, Anusha

    Published 2007
    “…This system was developing base on to three main part which is data processing, testing and implementation of the algorithm. In this system a Bayesian algorithm was used in order to implement the system. …”
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15
  16. 16

    Composing multi-relations association rules from crowdsourcing remuneration data by Siti Salwa Salleh, Nurhayati Zakaria, Norjansalika Janom, Syaripah Ruzaini Syed Aris, Noor Habibah Arshad

    Published 2022
    “…The data comprise a lot of redundancies, therefore an apriori algorithm is used to normalise it by removing redundancies and then extracting significant patterns. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Model of Bayesian tangent eye shape for eye capture by Nsaef, Asama Kuder, Jaafar, Azizah, Sliman, Layth, Sulaiman, Riza, O. K. Rahmat, Rahmita Wirza

    Published 2014
    “…Owing to maximum a posteriori estimation, we can identify similarity transform coefficients as well as the eye shape parameters in BTESM. To apply the maximum a posteriori procedure, tangent Eye shape vector was considered the state of the model which is hidden and expectation maximization depending on searching algorithm was adopted. …”
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18

    A robust traffic quantity measurement with video surveillance by Rad, A.G., Karim, M.R.

    Published 2011
    “…The method consists of three algorithms. First, background modeling and update, second, a boosting method to enhance the foreground image and reduce the noise and at last determining best match of region of interest (ROI) to extract information to conclude if there is a vehicle in the detection zone or not. …”
    Get full text
    Get full text
    Article
  19. 19

    Encrypted mobile messaging application using AES block cipher cryptography algorithm / Nur Rasyiqah Zulkifli by Zulkifli, Nur Rasyiqah

    Published 2019
    “…The programming language that is used to write the program is Java Language that will run on android phones. As the result, this project was tested on the functionality of the mobile messaging application. …”
    Get full text
    Get full text
    Student Project
  20. 20