Search Results - (( developing block learning algorithm ) OR ( java application during algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3

    Algorithm animation for cryptanalysis of caesar and hill ciphers / Sapiee Haji Jamel and Giuseppina Sherry Sayan by Jamel, Shafie, Sayan, Giuseppina Sherry

    Published 2009
    “…Each of the steps involved in the cryptanalysis is shown using animation technique developed using Macromedia Flash. This application is suitable for e-learning activities for students interested in the cryptanalysis of block cipher.…”
    Get full text
    Get full text
    Get full text
    Article
  4. 4
  5. 5

    Optimization of Motion Compensated Block-Based DCT Video Compression for Software Implementation by Chen, Soong Der

    Published 2000
    “…This thesis focuses on ways to improve the existing solutions in the algorithmic and implementation aspects. For the algorithmic aspect, the basic principles of motion compensated DCT block-based compression scheme was studied. …”
    Get full text
    Get full text
    Thesis
  6. 6

    A new machine learning-based hybrid intrusion detection system and intelligent routing algorithm for MPLS network by Mohammad Azmi Ridwan, Dr.

    Published 2023
    “…This thesis proposes a hybrid ML-based intrusion detection system (ML-IDS) and ML-based intelligent routing algorithm (ML-RA) for MPLS network. The research is divided into three parts, which are (1) dataset development, (2) algorithm development, and (3) algorithm performance evaluation. …”
    text::Thesis
  7. 7

    SUDOKU HELPER by Abdul Razak, Muhammad Asyraf

    Published 2015
    “…In this paper research, author presents an algorithm to provide a tutorial for any Sudoku player who got stuck during the solving process. …”
    Get full text
    Get full text
    Final Year Project
  8. 8

    Accident Prevention Block to Move an Automobile From Traffic Collision by Rajiv, Charles Samuel

    Published 2019
    “…This proposed solution is fueled by recent technological advancements like IoT (Internet of Things) and Machine Learning. In the present work, an attempt has been made to propose an accident prevention block in automobiles that can sense the tired/sleepy driver via a camera and algorithms, to maneuver the vehicle to safety. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Hyper-heuristic approaches for data stream-based iIntrusion detection in the Internet of Things by Hadi, Ahmed Adnan

    Published 2022
    “…Here, the memory consumption can be reduced by enabling a feature selection algorithm that excludes nonrelevant features and preserves the relevant ones. the algorithm is developed based on the variable length of the PSO. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Video Surveillance Image Enhancement Using Deep Learning by Aminudin, Muhamad Faris Che

    Published 2019
    “…To achieve the goal, Deep Learning Image Enhancement (DLIE) is proposed. There are two deep learning blocks which are Deep Learning Block 1 and Deep Learning Block2 (DLB1 and DLB2) and image fusion in the proposed DLIE model. …”
    Get full text
    Get full text
    Thesis
  11. 11

    BIOLOGICAL INSPIRED INTRUSION PREVENTION AND SELF-HEALING SYSTEM FOR CRITICAL SERVICES NETWORK by MOHAMED AHMED ELSHEIK, MUNA ELSADIG

    Published 2011
    “…The design features of the proposed system are inspired by the human immune system, integrated with pattern recognition nonlinear classification algorithm and machine learning. Firstly, the current intrusions preventions systems, biological innate and adaptive immune systems, autonomic computing and self-healing mechanisms are studied and analyzed. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Development of unconstrained handwritten digit extraction, segmentation and recognition on bank cheques using artificial neural network by Francis, Adam

    Published 2005
    “…The third objective is to perform Vertical Splitting Algorithm technique for digit segmentation. And lastly, to develop an Artificial Neural Network for digit recognition. …”
    Get full text
    Student Project
  13. 13

    Spiking Neural Network For Energy Efficient Learning And Recognition by Wong, Yan Chiew, Wang, Ning Lo

    Published 2020
    “…This work presents essential properties of a spiking feedforward computing system that emulates the behaviour of biological neural networks, showing the potential for learning and classification in significantly reduced energy resources…”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Talkout : Protecting mental health application with a lightweight message encryption by Gavin Teo Juen

    Published 2022
    “…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  15. 15

    Blood cell classification using deep learning by Liaw, Mun Kin

    Published 2022
    “…The motivation was gotten from the literature review section where various researchers developed their own methods manually through experimenting such as ensemble methods, learning algorithms, combined methodologies, etc. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  16. 16

    An evaluation of Monte Carlo-based hyper-heuristic for interaction testing of industrial embedded software applications. by S. Ahmed, Bestoun, Enoiu, Eduard, Afzal, Wasif, Kamal Z., Zamli

    Published 2020
    “…We applied Q-EMCQ on 37 real-world industrial programs written in Function Block Diagram (FBD) language, which is used for developing a train control management system at Bombardier Transportation Sweden AB. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Raspberry Pi-Based Finger Vein Recognition System Using PCANet by Quek, Ee Wen

    Published 2018
    “…PCA is employed for learning multistage filter banks. Binary hashing and block histograms are the steps for indexing and pooling. …”
    Get full text
    Get full text
    Monograph
  18. 18

    Human hearing disorder recognition model using eeg-aep based signal by Md Nahidul, Islam

    Published 2022
    “…This study investigated two conventional machine learning algorithms: support vector machine (SVM) and k-nearest neighbors (KNN), and two deep learning techniques: convolutional neural network (CNN) and improved-VGG16 model. …”
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20

    Spear- phishing attack detection using artificial intelligence by Rajkumaradevan, Sanglidevan

    Published 2024
    “…This project focuses on developing machine learning-based applications to enhance cybersecurity, specifically the Spear Phishing Attack Detection (S.P.A.D) system and the Email/SMS Classifier. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis