Search Results - (( java application customization algorithm ) OR ( learning classification drops algorithm ))

  • Showing 1 - 11 results of 11
Refine Results
  1. 1

    Development of predictive modeling and deep learning classification of taxi trip tolls by Al-Shoukry, Suhad, M. Jawad, Bushra Jaber, Zalili, Musa, Sabry, Ahmad H.

    Published 2022
    “…Commercial navigation includes a wealth of trip-related data, including distance, expected journey time, and tolls that may be encountered along the way. Using a classification algorithm, it is possible to extract drop-off and pickup locations from taxi trip data and estimate if the tour would incur tolls. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Network Traffic Classification Analysis on Differentiated Services Code Point Using Deep Learning Models for Efficient Deep Packet Inspection by Ahmed Khan, Fazeel, Abubakar, Adamu

    Published 2024
    “…The data was gathered using real-time packet capturing tools which were then processed and moved with model development using different deep learning algorithms such as, LSTM, MLP, RNN and Autoencoders. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    DEVELOPMENT OF PREDICTIVE MODELING AND DEEP LEARNING CLASSIFICATION OF TAXI TRIP TOLLS by Al-Shoukry S., Jawad B.J.M., Musa Z., Sabry A.H.

    Published 2023
    “…Commercial navigation includes a wealth of trip-related data, including distance, expected journey time, and tolls that may be encountered along the way. Using a classification algorithm, it is possible to extract drop-off and pickup locations from taxi trip data and estimate if the tour would incur tolls. …”
    Article
  4. 4

    Blood cell classification using deep learning by Liaw, Mun Kin

    Published 2022
    “…The advancement of Artificial Intelligence (AI) has introduced complex methods such as deep learning that would automate the classification of blood cells in a fast and accurate manner Thus, the study of White Blood Cells (WBCs) classification using deep learning techniques is proposed in this research. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  5. 5

    A comparative study and simulation of object tracking algorithms by Ji, Yuanfa, Yin, Pan, Sun, Xiyan, Kamarul Hawari, Ghazali, Guo, Ning

    Published 2020
    “…This article introduces the popular object tracking algorithms, from common problems in object tracking to the classification of algorithms: Early classic trackingalgorithms, tracking algorithms based on kernel correlation filtering, and tracking algorithms based on deep learning. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    Automated traffic counting data collection and analysis by Low, Anand Hong Ren

    Published 2021
    “…The performance of the algorithm is determined by the counting, classification, and speed measuring accuracy. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  7. 7

    An efficient anomaly intrusion detection method with evolutionary neural network by Sarvari, Samira

    Published 2020
    “…Although activation functions are important for MLP to learn but for nonlinear complex functional mappings it has complicated calculation which reduces the accuracy of classification. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Computer-assisted pterygium screening system: a review by Abdani, Siti Raihanah, Zulkifley, Mohd Asyraf, Shahrimin, Mohamad Ibrani, Zulkifley, Nuraisyah Hani

    Published 2022
    “…During the early stage of automated pterygium screening system development, conventional machine learning techniques such as support vector machines and artificial neural networks are the de facto algorithms to detect the presence of pterygium tissues. …”
    Get full text
    Get full text
    Article
  9. 9

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Machine Learning Based Two Phase Detection and Mitigation Authentication Scheme for Denial-of-Service Attacks in Software Defined Networks by Najmun, Najmun

    Published 2024
    “…This scheme incorporates machine learning techniques by utilizing Support Vector Machine (SVM) and K-Nearest Neighbors (KNN) classification algorithms to accurately identify and handle malicious network traffic following the initial packet filtration process that identifies abnormal traffic. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    Design & Development of a Robotic System Using LEGO Mindstorm by Abd Manap, Nurulfajar, Md Salim, Sani Irwan, Haron, Nor Zaidi

    Published 2006
    “…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item