Search Results - (( deep learning normalization algorithm ) OR ( java implementation using algorithm ))
Search alternatives:
- normalization algorithm »
- learning normalization »
- implementation using »
- java implementation »
- using algorithm »
-
1
An efficient attack detection for Intrusion Detection System (IDS) in internet of medical things smart environment with deep learning algorithm
Published 2023“…To achieve this, we measured the performance of three deep learning algorithms for normal and abnormal detection of IDS, and a comparison was made to select the best performance of the deep learning algorithm for detection in IDS, such as RNN, DBN and CNN. …”
Get full text
Get full text
Article -
2
Smart object detection using deep learning algorithm and jetson nano for blind people
Published 2021“…Therefore, this project develops a smart object detection using deep learning algorithm and jetson nano to improve object detection for blind people. …”
Get full text
Get full text
Conference or Workshop Item -
3
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
4
DeepIoT.IDS: Hybrid deep learning for enhancing IoT network intrusion detection
Published 2021“…Recently, researchers have suggested deep learning (DL) algorithms to define intrusion features through training empirical data and learning anomaly patterns of attacks. …”
Get full text
Get full text
Get full text
Article -
5
VGG16-based deep learning architectures for classification of lung sounds into normal, crackles, and wheezes using Gammatonegrams
Published 2023Get full text
Get full text
Get full text
Conference or Workshop Item -
6
Performance Analysis of Machine Learning and Deep Learning Architectures on Early Stroke Detection Using Carotid Artery Ultrasound Images
Published 2024journal::journal article -
7
Water wave optimization with deep learning driven smart grid stability prediction
Published 2022“…Recent advancements in Machine Learning (ML) and Deep Learning (DL) models enable the designing of effective stability prediction models in SGs. …”
Get full text
Get full text
Get full text
Article -
8
Provider independent cryptographic tools
Published 2003“…The library is implemented by using Java cryptographic service provider framework that conforms to Java Cryptographic Architecture (JCA) and Java Cryptographic Extension (JCE). …”
Get full text
Get full text
Get full text
Monograph -
9
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
10
Investigate And Analysis Of Deep Learning And Machine Learning Algorithm For Face Mask Detection System
Published 2022Get full text
Get full text
Undergraduates Project Papers -
11
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
12
Flock optimization algorithm-based deep learning model for diabetic disease detection improvement
Published 2024“…Hence, the research objective is to create an improved diabetic disease detection system using a Flock Optimization Algorithm-Based Deep Learning Model (FOADLM) feature modeling approach that leverages the PIMA Indian dataset to predict and classify diabetic disease cases. …”
Get full text
Get full text
Article -
13
Forecasting and Trading of the Stable Cryptocurrencies With Machine Learning and Deep Learning Algorithms for Market Conditions
Published 2023“…Thus, this proposed system employs a data science-based framework and six highly advanced data-driven Machine learning and Deep learning algorithms: Support Vector Regressor, Auto-Regressive Integrated Moving Average (ARIMA), Facebook Prophet, Unidirectional LSTM, Bidirectional LSTM, Stacked LSTM. …”
Get full text
Get full text
Article -
14
Automated cone cut error detection of bitewing images using convolutional neural network
Published 2023“…The deep learning method selected was Convolutional Neural Network (CNN), and the algorithm was used and trained to classify the cone cut error. …”
Get full text
Get full text
Proceeding Paper -
15
Performance evaluation of real-time multiprocessor scheduling algorithms
Published 2016“…We hyave used the CPU profiler of Oracle JavaTM VisualVM to monitor the execution of LRE-TL as well as USG algorithms. …”
Get full text
Get full text
Conference or Workshop Item -
16
Deep learning-based item classification for retail automation
Published 2025“…This project focuses on developing a deep learning-based system for retail item classification. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
17
CNN-LSTM: hybrid deep neural network for network intrusion detection system; a case
Published 2022“…Numerous studies implemented machine learning algorithms to develop an effective IDS; however, with the advent of deep learning algorithms and artificial neural networks that can generate features automatically without human intervention, researchers began to rely on deep learning. …”
Get full text
Get full text
Get full text
Get full text
Article -
18
Automatic Number Plate Recognition on android platform: With some Java code excerpts
Published 2016“…On the other hand, the traditional algorithm using template matching only obtained 83.65% recognition rate with 0.97 second processing time. …”
Get full text
Get full text
Get full text
Book -
19
ICS cyber attack detection with ensemble machine learning and DPI using cyber-Kit datasets
Published 2021“…The processed metadata is normalized for the easiness of algorithm analysis and modelled with machine learning-based latest deep learning ensemble LSTM algorithms for anomaly detection. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
20
Semi-Supervised Learning for limited medical data using Generative Adversarial Network and Transfer Learning
Published 2020“…Deep Learning algorithms necessitate a large amount of data for training which is hard to acquire for medical problems. …”
Get full text
Get full text
Conference or Workshop Item
