Search Results - (( features expansion function algorithm ) OR ( java application modified algorithm ))

  • Showing 1 - 9 results of 9
Refine Results
  1. 1
  2. 2

    Modern fuzzy min max neural networks for pattern classification by Al Sayaydeh, Osama Nayel Ahmad

    Published 2019
    “…The MDFMM introduces a number of contributions in addition to modify the original FMM expansion activation function by replace it with that from the Enhanced Fuzzy Min Max (EFMM) to eliminate the overlapping cases. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…A GUI is created in a form of JAVA application to display data detected from tag. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Automatic generation of content security policy to mitigate cross site scripting by Mhana, Samer Attallah, Din, Jamilah, Atan, Rodziah

    Published 2016
    “…The algorithm is implemented as a plugin. It does not interfere with the web application original code. …”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    An Education-Based System for Two-Way Translations of Sign Language by Muhammad Faiz Aiman, Che Umar, Hock Tze, Wong@ Farrah Wong, Sariah, Abang, Jamal, Ahmad Dargham, Seng Kheau, Chung, Mazlina, Mamat

    Published 2025
    “…To enhance the system's functionality, future work could focus on continuous signing, dataset expansion, and adaptive learning. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system by Beg, Abul Hashem

    Published 2011
    “…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
    Get full text
    Get full text
    Thesis
  7. 7

    SPY-BOT: Machine learning-enabled post filtering for social network-integrated industrial internet of things by Rahman, Md. Arafatur, Zaman, Nafees, Asyhari, A. Taufiq, Sadat, M. S. Nazmus, Pillai, Prashant, Ruzaini, Abdullah Arshah

    Published 2021
    “…The scheme creates class labels based on the featured keywords from the decision user and classifies suspicious contacts through the aid of ML. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    SPY-BOT: Machine learning-enabled post filtering for social network-integrated industrial internet of things by Rahman, Md. Arafatur, Zaman, Nafees, Asyhari, A. Taufiq, Nazmus Sadat, S. M., Pillai, Prashant, Ruzaini, Abdullah Arshah

    Published 2021
    “…The scheme creates class labels based on the featured keywords from the decision user and classifies suspicious contacts through the aid of ML. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  9. 9