Search Results - (( developing block learning algorithm ) OR ( java application stemming algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3

    Algorithm animation for cryptanalysis of caesar and hill ciphers / Sapiee Haji Jamel and Giuseppina Sherry Sayan by Jamel, Shafie, Sayan, Giuseppina Sherry

    Published 2009
    “…Each of the steps involved in the cryptanalysis is shown using animation technique developed using Macromedia Flash. This application is suitable for e-learning activities for students interested in the cryptanalysis of block cipher.…”
    Get full text
    Get full text
    Get full text
    Article
  4. 4
  5. 5

    Optimization of Motion Compensated Block-Based DCT Video Compression for Software Implementation by Chen, Soong Der

    Published 2000
    “…This thesis focuses on ways to improve the existing solutions in the algorithmic and implementation aspects. For the algorithmic aspect, the basic principles of motion compensated DCT block-based compression scheme was studied. …”
    Get full text
    Get full text
    Thesis
  6. 6

    A new machine learning-based hybrid intrusion detection system and intelligent routing algorithm for MPLS network by Mohammad Azmi Ridwan, Dr.

    Published 2023
    “…This thesis proposes a hybrid ML-based intrusion detection system (ML-IDS) and ML-based intelligent routing algorithm (ML-RA) for MPLS network. The research is divided into three parts, which are (1) dataset development, (2) algorithm development, and (3) algorithm performance evaluation. …”
    text::Thesis
  7. 7

    Accident Prevention Block to Move an Automobile From Traffic Collision by Rajiv, Charles Samuel

    Published 2019
    “…This proposed solution is fueled by recent technological advancements like IoT (Internet of Things) and Machine Learning. In the present work, an attempt has been made to propose an accident prevention block in automobiles that can sense the tired/sleepy driver via a camera and algorithms, to maneuver the vehicle to safety. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Hyper-heuristic approaches for data stream-based iIntrusion detection in the Internet of Things by Hadi, Ahmed Adnan

    Published 2022
    “…Here, the memory consumption can be reduced by enabling a feature selection algorithm that excludes nonrelevant features and preserves the relevant ones. the algorithm is developed based on the variable length of the PSO. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Video Surveillance Image Enhancement Using Deep Learning by Aminudin, Muhamad Faris Che

    Published 2019
    “…To achieve the goal, Deep Learning Image Enhancement (DLIE) is proposed. There are two deep learning blocks which are Deep Learning Block 1 and Deep Learning Block2 (DLB1 and DLB2) and image fusion in the proposed DLIE model. …”
    Get full text
    Get full text
    Thesis
  10. 10

    BIOLOGICAL INSPIRED INTRUSION PREVENTION AND SELF-HEALING SYSTEM FOR CRITICAL SERVICES NETWORK by MOHAMED AHMED ELSHEIK, MUNA ELSADIG

    Published 2011
    “…The design features of the proposed system are inspired by the human immune system, integrated with pattern recognition nonlinear classification algorithm and machine learning. Firstly, the current intrusions preventions systems, biological innate and adaptive immune systems, autonomic computing and self-healing mechanisms are studied and analyzed. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Development of unconstrained handwritten digit extraction, segmentation and recognition on bank cheques using artificial neural network by Francis, Adam

    Published 2005
    “…The third objective is to perform Vertical Splitting Algorithm technique for digit segmentation. And lastly, to develop an Artificial Neural Network for digit recognition. …”
    Get full text
    Student Project
  12. 12

    Spiking Neural Network For Energy Efficient Learning And Recognition by Wong, Yan Chiew, Wang, Ning Lo

    Published 2020
    “…This work presents essential properties of a spiking feedforward computing system that emulates the behaviour of biological neural networks, showing the potential for learning and classification in significantly reduced energy resources…”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Blood cell classification using deep learning by Liaw, Mun Kin

    Published 2022
    “…The motivation was gotten from the literature review section where various researchers developed their own methods manually through experimenting such as ensemble methods, learning algorithms, combined methodologies, etc. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  14. 14

    An evaluation of Monte Carlo-based hyper-heuristic for interaction testing of industrial embedded software applications. by S. Ahmed, Bestoun, Enoiu, Eduard, Afzal, Wasif, Kamal Z., Zamli

    Published 2020
    “…We applied Q-EMCQ on 37 real-world industrial programs written in Function Block Diagram (FBD) language, which is used for developing a train control management system at Bombardier Transportation Sweden AB. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Raspberry Pi-Based Finger Vein Recognition System Using PCANet by Quek, Ee Wen

    Published 2018
    “…PCA is employed for learning multistage filter banks. Binary hashing and block histograms are the steps for indexing and pooling. …”
    Get full text
    Get full text
    Monograph
  16. 16

    Human hearing disorder recognition model using eeg-aep based signal by Md Nahidul, Islam

    Published 2022
    “…This study investigated two conventional machine learning algorithms: support vector machine (SVM) and k-nearest neighbors (KNN), and two deep learning techniques: convolutional neural network (CNN) and improved-VGG16 model. …”
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18

    Spear- phishing attack detection using artificial intelligence by Rajkumaradevan, Sanglidevan

    Published 2024
    “…This project focuses on developing machine learning-based applications to enhance cybersecurity, specifically the Spear Phishing Attack Detection (S.P.A.D) system and the Email/SMS Classifier. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  19. 19

    ReSTiNet: An Efficient Deep Learning Approach to Improve Human Detection Accuracy by Sumit, S.S., Rambli, D.R.A., Mirjalili, S., Miah, M.S.U., Ejaz, M.M.

    Published 2023
    “…To improve the detection speed and accuracy of ReSTiNet, the residual block within the fire modules is carefully designed to increase the feature propagation and maximize the information flow in the network. …”
    Get full text
    Get full text
    Article
  20. 20

    Decision tree and rule-based classification for predicting online purchase behavior in Malaysia / Maslina Abdul Aziz, Nurul Ain Mustakim and Shuzlina Abdul Rahman by Abdul Aziz, Maslina, Mustakim, Nurul Ain, Abdul Rahman, Shuzlina

    Published 2024
    “…The performance of six machine learning models comprising J48, Random Tree, REPTree representing decision trees and JRip, PART, and OneR as rule-based algorithms was assessed. …”
    Get full text
    Get full text
    Article