Search Results - (( frames machine learning algorithm ) OR ( java implementation level algorithm ))

Refine Results
  1. 1

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…The encryption algorithms are playing an important part in the protection level for data. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Fast shot boundary detection based on separable moments and support vector machine by Idan, Zinah N., Abdulhussain, Sadiq H., Mahmmod, Basheera M., Al-Utaibi, Khaled A., Syed Abdul Rahman Al-, Syed Abdul Rahman Al-Hadad, Sait, Sadiq M.

    Published 2021
    “…As a result, the computational cost is reduced in the subsequent stages. Finally, machine learning statistics based on the support vector machine is implemented to detect the cut transitions. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Implementation of (AES) Advanced Encryption Standard algorithm in communication application by Moh, Heng Huong

    Published 2014
    “…Internet communication has become more common in this modern world recently, and one of the important algorithms used is ABS algorithm. However, most of the users have inadequate knowledge and understanding regard to this algorithm implementation in the communication field, as well as the level of security and accuracy will be questioned by the users because of the necessary to maintain the confidentiality of particular data transferred. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  4. 4

    A deep reinforcement learning hybrid algorithm for the computational discovery and characterization of small proteins utilizing mycobacterium tuberculosis as a model by Ouwabunmi, Babalola AbdulHafeez

    Published 2025
    “…This study presents the development and evaluation of a novel hybrid machine learning algorithm that integrates the strengths of Random Forest and Gradient Boosting models to enhance the prediction of smORFs. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Machine Learning-Enabled Communication Approach for the Internet of Medical Things by Rahim Khan, Abdullah Ghani, Samia Allaoua Chelloug, Mohammed Amin, Aamir Saeed, Jason Teo

    Published 2023
    “…In this paper, a machine learning-enabled shortest path identification scheme is presented to ensure reliable transmission of frames, especially with the minimum possible communication overheads in the IoMT network. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Implementation of locust inspired scheduling algorithm with huge number of servers for energy efficiency in a cloud datacenter by Azhar, Nur Huwaina

    Published 2019
    “…It does not consider the LACE algorithm implemented in huge number of server in one Cloud datacenter. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Using predictive analytics to solve a newsvendor problem / S. Sarifah Radiah Shariff and Hady Hud by Shariff, S. Sarifah Radiah, Hud, Hady

    Published 2023
    “…Secondly, in solving every Machine Learning problem, there is no one algorithm superior to other algorithms. …”
    Get full text
    Get full text
    Book Section
  8. 8

    Designing machine learning frameworks for intelligence and gamification research / Nordin Abu Bakar by Abu Bakar, Nordin

    Published 2016
    “…Machine learning frameworks have been utilised to facilitate intelligence as operational mechanism in intelligence embedded system such as learning system, prediction protocol and robot navigation system. …”
    Get full text
    Get full text
    Thesis
  9. 9

    An intelligent risk management framework for monitoring vehicular engine health by Rahim, Md. Abdur, Rahman, Md. Arafatur, Rahman, Md. Mustafizur, Zaman, Nafees, Moustafa, Nour, Razzak, Imran

    Published 2022
    “…We used machine learning and deep learning algorithms to assess the effectiveness of the risk management system’s decision model. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Adaptive model predictive control based on wavelet network and online sequential extreme learning machine for nonlinear systems by Salih, Dhiadeen Mohammed

    Published 2015
    “…Recently, an online sequential extreme learning machine (OSELM) algorithm has been introduced based on extreme learning machine (ELM) theories for single hidden layer feedforward neural networks (SLFN) and has been applied for different online applications. …”
    Get full text
    Get full text
    Thesis
  11. 11

    A Model for Evaluation of Cryptography Algorithm on UUM Portal by Norliana, Abdul Majid

    Published 2004
    “…Level one is the development of userID and password, level two involve the insertion of the testing parameter speed coding. …”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application by Yana Aditia, Gerhana, Nur, Lukman, Arief Fatchul, Huda, Cecep Nurul, Alam, Undang, Syaripudin, Devi, Novitasari

    Published 2020
    “…Performance Testing is used to test the performance of algorithm implementations in applications. The test results show that the Boyer Moore and Knuth Morris Pratt algorithms have an accuracy rate of 100%, and the Horspool algorithm 85.3%. …”
    Get full text
    Get full text
    Journal
  13. 13

    An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe by Yakub Kayode, Saheed, Kazeem Alagbe, Gbolagade

    Published 2017
    “…We use a parallel technique that divides RSA power process into seperate threads and employs the use of Chinese Remainder Theorem (CRT) to decrease the time required for both encryption and decryption operation. Java programming language is used to implement the algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Design and Implementation of Data-at-Rest Encryption for Hadoop by Wan Nor Shuhadah, Wan Nik, Mohamad Afendee, Mohamed, Zarina, Mohamad, Siti Hanisah, Kamaruzaman

    Published 2017
    “…Therefore, the AES encryption algorithm has been implemented in HDFS to ensure the security of data stored in HDFS. …”
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15

    Design and Implementation of Data-at-Rest Encryption for Hadoop by Wan Nor Shuhadah, Wan Nik, Mohamad Afendee, Mohamed, Zarina, Mohamad, Siti Hanisah, Kamaruzaman

    Published 2017
    “…Therefore, the AES encryption algorithm has been implemented in HDFS to ensure the security of data stored in HDFS. …”
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16
  17. 17

    Vibration Signal for Bearing Fault Detection using Random Forest by Abedin T., Koh S.P., Yaw C.T., Phing C.C., Tiong S.K., Tan J.D., Ali K., Kadirgama K., Benedict F.

    Published 2024
    “…Based on the chosen properties of an induction motor, a random forest (RF) classifier, a machine learning technique, is examined in this study for bearing failure detection. …”
    Conference Paper
  18. 18

    Passenger Counting With Face Detection by Teoh, Han Wei

    Published 2020
    “…Driven by the success of machine learning, this study aims to develop a real-time passenger counting system. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  19. 19

    Enhanced emotion recognition in videos: a convolutional neural network strategy for human facial expression detection and classification by Ashraf, Arselan, Gunawan, Teddy Surya, Arifin, Fatchul, Kartiwi, Mira, Sophian, Ali, Habaebi, Mohamed Hadi

    Published 2023
    “…Despite extensive research employing machine learning algorithms like convolutional neural networks (CNN), challenges remain concerning input data processing, emotion classification scope, data size, optimal CNN configurations, and performance evaluation. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    REGION-BASED ADAPTIVE DISTRIBUTED VIDEO CODING CODEC by ABDELRAHMAN ELAMIN, ABDELRAHMAN ELAMIN

    Published 2011
    “…This work also prbposes a feedback-free region-based adaptive DVC solution in pixel domain based on machine learning approach to estimate the side information. …”
    Get full text
    Get full text
    Thesis