Search Results - (( identification implementation phase algorithm ) OR ( java application customization algorithm ))
Search alternatives:
- identification implementation »
- customization algorithm »
- implementation phase »
- java application »
- phase algorithm »
-
1
Rabbit breed classification using CNN / Aishah Nabila Mohd Zaid
Published 2024“…The design and implementation phase focus on prototype development, while the evaluation phase assesses classification performance. …”
Get full text
Get full text
Thesis -
2
-
3
-
4
Arabic Speaker Identification System for Forensic Authentication Using K-NN Algorithm
Published 2023Conference Paper -
5
A novel discrete wavelet transform-based graphical language classifier for identification of high-impedance fault in distribution power system
Published 2020“…This paper proposes a discrete wavelet transform (DWT)-based Graphical Language classifier algorithm for identification of high-impedance fault (HIF) in medium voltage (MV) distribution network of 13.8 kV. …”
Get full text
Get full text
Get full text
Article -
6
Object detection in aerial images using Convolutional Neural Network (CNN) / Wan Nur Alya Athirah Wan Roshdee
Published 2024“…To solve this aim, several steps will be used including analysis, design, development, evaluation, and documentation phases. It also has been explained about the use of Convolutional Neural Network (CNN) in the project, the advantages and disadvantages, the implementation of the algorithm in various problem and similar works with the project title. …”
Get full text
Get full text
Thesis -
7
Efficient relay placement algorithm using landscape aware routing (erpalar)
Published 2011“…Main contribution of ERP ALAR include user-centered, cheap, rugged and improved network access system through the following inputs: 3D implementation that takes care of landscape structures such as mountains and hills which is a common phenomenon in rural regions; extension of the current network coverage reach through the use of wireless relays; strategic deployment plan for the rural population through phase-by-phase deployment; cheap and affordable hardware implementation to minimize overall investment cost; and use of rugged WiFi hardware (IEEE 802.11 b) to minimize attention required on maintenance. …”
Get full text
Get full text
Thesis -
8
Data mining for structural damage identification using hybrid artificial neural network based algorithm for beam and slab girder / Meisam Gordan
Published 2020“…After evaluating the results of these algorithms, a hybrid Artificial Neural Network-based Imperial Competitive Algorithm (ANN-ICA) was presented in the deployment step of the proposed methodology to identify the structural damage of illustrative structures. …”
Get full text
Get full text
Get full text
Thesis -
9
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
Get full text
Get full text
Thesis -
10
A new algorithm for human face detection using skin color tone
Published 2013“…This system can detect a face regardless of the background of the picture, which is an important phase for face identification. The images used in this system are color images which give additional information about the images than the gray images provide. …”
Get full text
Get full text
Get full text
Article -
11
An improved narrowband active noise control system without secondary path modelling based on the time domain
Published 2019“…The acoustic noise generated is further compounded by using secondary path identification which makes the system complex. There are several available ANC algorithms that do not require secondary path estimation for modifying the FxLMS algorithms. …”
Get full text
Get full text
Get full text
Get full text
Article -
12
Deep learning model for 5W (What, When, Where, Who, and Why) sign language translation system / Raihah Aminuddin, Ummu Mardhiah Abdul Jalil and Norsyamimi Hasran
Published 2023“…The project follows the waterfall model, which consists of four phases: requirement analysis, design, implementation, and testing. …”
Get full text
Get full text
Get full text
Book Section -
13
A New Swarm-Based Framework for Handwritten Authorship Identification in Forensic Document Analysis
Published 2014“…The use of feature selection as one of the important machine learning task is often disregarded in Writer Identification domain, with only a handful of studies implemented feature selection phase. …”
Get full text
Get full text
Book Chapter -
14
A new swarm-based framework for handwritten authorship identification in forensic document analysis
Published 2014“…The use of feature selection as one of the important machine learning task is often disregarded in Writer Identification domain, with only a handful of studies implemented feature selection phase. …”
Get full text
Get full text
Book Chapter -
15
Penentuan Kerelevanan Dokumen Menggunakan Rangkaian Rambatan Balik
Published 2002“…Several phases are involved, namely as the identification of the document's atributes, implementation of NN, identification of NN parameters and development of simple search engine prototype. 53 documents have been uploaded into the database for evaluation purpose. …”
Get full text
Get full text
Get full text
Thesis -
16
TPAAD: Two-phase authentication system for denial of service attack detection and mitigation using machine learning in software-defined network
Published 2024“…Support vector machine and K-nearest neighbours algorithms were utilized for efficient detection on the CICDoS 2017 dataset. …”
Get full text
Get full text
Get full text
Get full text
Article -
17
A PLC-based Hybrid Fuzzy PID Controller for PWM-driven Variable Speed Drive
Published 2010“…A simulation model in MA TLAB/Simulink is developed using system identification technique to perform verification of the PLCbased intelligent controller of the PWM-driven VVVF algorithm. …”
Get full text
Get full text
Thesis -
18
A Neighborhood and Machine Learning-Enabled Information Fusion Approach for the WSNs and Internet of Medical Things
Published 2022“…For this purpose, the proposed data aggregation scheme is divided into two phases: (i) identification of neighboring nodes, which is based on the MAC address and location, and (ii) data aggregation using k-mean clustering algorithm and Support Vector Machine (SVM). …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
19
Convolutional neural network based mobile application for poisonous mushroom detection
Published 2025“…There are 3 main phases of the research methodology, which cover the data collection and preprocessing, model design and implementation, and performance evaluation. …”
Get full text
Get full text
Get full text
Article -
20
Fractal coding of bio-metric image for face authentication
Published 2021Get full text
Get full text
Thesis
