Search Results - (( its implementation function algorithm ) OR ( code classification problems algorithm ))
Search alternatives:
- implementation function »
- code classification »
- its implementation »
- function algorithm »
- problems »
-
1
Object-Oriented Programming semantics representation utilizing agents
Published 2011“…Novices tend to refer to source codes examples and adapt the source codes to the problem given in their assignments. …”
Get full text
Get full text
Get full text
Article -
2
Scene classification for aerial images based on CNN using sparse coding technique
Published 2017“…Recent developments include several approaches and numerous algorithms address the task. This article proposes a convolutional neural network (CNN) approach that utilizes sparse coding for scene classification applicable for HRRS unmanned aerial vehicle (UAV) and satellite imagery. …”
Get full text
Get full text
Article -
3
Maldroid- attribute selection analysis for malware classification
Published 2019“…Hence, the objective of this paper is to find the most effective and efficient attribute selection and classification algorithm in malware detection. Moreover, in order to get the best combination between attribute selection and classification algorithm, eight attributes selection and seven categories machine learning algorithm are applied in this study. …”
Get full text
Get full text
Get full text
Article -
4
Scene classification for aerial images based on CNN using sparse coding technique
Published 2023Article -
5
Whale Optimisation Freeman Chain Code (WO-FCC) extraction algorithm for handwritten character recognition
Published 2021Get full text
Get full text
Get full text
Conference or Workshop Item -
6
A-star (A*) algorithm implementation for robotics path planning navigation
Published 2018“…This thesis is about the implementation of Astar (A*) algorithm as path planning algorithm used in robotics navigation. …”
Get full text
Get full text
Undergraduates Project Papers -
7
A multilayered convolutional sparse coding framework for modeling of pooling operation of convolution neural networks
Published 2019“…The multilayered version of CSC(ML-CSC) is shown to be connected to forward pass of CNNs and dictionary learning and sparse coding algorithms of this model are analyzed for solving classification and inverse problems in image processing. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
8
Training functional link neural network with ant lion optimizer
Published 2020“…This paper proposed the implementation of Ant Lion Algorithm as learning algorithm to train the FLNN for classification tasks. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
9
Design and implementation of MD5 hash function algorithm using verilog HDL
Published 2022“…Among hash algorithms, MD5 is the most used hash function algorithm. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
10
Design and Implementation of MDS Hash Function Algorithm Using Verilog HDL
Published 2020“…Among hash algorithms, MD5 is the most used hash function algorithm. …”
Get full text
Get full text
Get full text
Article -
11
Improving hand written digit recognition using hybrid feature selection algorithm
Published 2022“…Therefore, many researchers have applied and developed various machine learning algorithms that could efficiently tackle the handwritten digit recognition problem. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
12
Cloud Worm Detection and Response Technique By Integrating The Enhanced Genetic Algorithm An Threat Level
Published 2024thesis::doctoral thesis -
13
Implementation of safe experimentation spiral dynamics algorithm for self-tuning of PID controller in elastic joint manipulator
Published 2022“…Such modification is implemented to exploit the ability of spiral function in enhancing both the algorithm's exploration competency and convergence accuracy. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
14
Enhancing speed performance of the cryptographic algorithm based on the lucas sequence
Published 2003“…The deployment of network security procedures requires the implementation of cryptographic functions. More specifically, these include encryption, decryption, authentication, digital signature algorithms and message-digest functions. …”
Get full text
Get full text
Thesis -
15
-
16
DESIGN AND IMPLEMENTATION OF RIPEMD-160 HASH FUNCTION USING VERILOG HDL
Published 2022“…This project proposes to design an iterative method of RIPEMD-160 in order to investigate the security algorithm and its implementation. Besides that, iterative methods also used to improve the frequency, power and are requirements performance of RIPEMD-160 hash function. …”
Get full text
Get full text
Final Year Project Report / IMRAD -
17
Design Methodology and Analysis of Hash Function based-on Field Programmable Gate Array for Hash-based Message Authentication Code Application
Published 2025“…For this purpose, cryptography hash functions are selected as a design target. These algorithms have been studied to improve the speed, area implementation, and power consumption. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
18
Plant identification using combination of fuzzy c-means spatial pyramid matching, gist, multi-texton histogram and multiview dictionary learning
Published 2016“…Beside that, classic bag of visual words algorithm (BoVW) is based on kmeans clustering and every SIFT feature belongs to one cluster and it leads to decreasing classification results. …”
Get full text
Get full text
Thesis -
19
Hybrid evolutionary optimization algorithms: A case study in manufacturing industry
Published 2014“…This membership function is applied for its useful performance through industrial production problems by employing hybrid evolutionary optimization algorithms. …”
Get full text
Get full text
Book -
20
Computing the autopilot control algorithm using predictive functional control for unstable model
Published 2009“…Hence, designed PFC algorithm need to find the suitable tuning parameters as its play an important part of the designing the autopilot controller. …”
Get full text
Get full text
Conference or Workshop Item
