Search Results - (( java application during algorithm ) OR ( data classification drops algorithm ))

  • Showing 1 - 20 results of 20
Refine Results
  1. 1

    Development of predictive modeling and deep learning classification of taxi trip tolls by Al-Shoukry, Suhad, M. Jawad, Bushra Jaber, Zalili, Musa, Sabry, Ahmad H.

    Published 2022
    “…Using a classification algorithm, it is possible to extract drop-off and pickup locations from taxi trip data and estimate if the tour would incur tolls. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Network Traffic Classification Analysis on Differentiated Services Code Point Using Deep Learning Models for Efficient Deep Packet Inspection by Ahmed Khan, Fazeel, Abubakar, Adamu

    Published 2024
    “…There is a need to have effective prioritization and classification of IP packets for routers to enable the forwarding of such packets including packets having critical data efficiently and with a lower drop rate. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    DEVELOPMENT OF PREDICTIVE MODELING AND DEEP LEARNING CLASSIFICATION OF TAXI TRIP TOLLS by Al-Shoukry S., Jawad B.J.M., Musa Z., Sabry A.H.

    Published 2023
    “…Using a classification algorithm, it is possible to extract drop-off and pickup locations from taxi trip data and estimate if the tour would incur tolls. …”
    Article
  4. 4

    Electronic Tongue: Study on the Freshness of Milk by Jaafar, Mohamad Nazrin

    Published 2012
    “…After the experiment has been done, the data obtained was used in Matlab for classification purpose. …”
    Get full text
    Get full text
    Final Year Project
  5. 5

    Automated traffic counting data collection and analysis by Low, Anand Hong Ren

    Published 2021
    “…The performance of the algorithm is determined by the counting, classification, and speed measuring accuracy. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  6. 6

    Comparison of algorithm Support Vector Machine and C4.5 for identification of pests and diseases in chili plants by M, Irfan, N, Lukman, A. A, Alfauzi, J, Jumadi

    Published 2019
    “…In this study comparing the performance classification techniques of Support Vector Machine (SVM) and C4.5 algorithms. …”
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    Land Use Changes in Jeli, Kelantan by Muhammad Firdaus Abdul Karim

    Published 2013
    “…Satellite imagery are pre-processed in geometric correction and further processed in subsetting, masking cloud and supervised classification. Land use maps from supervised classification of satellite imagery and existing land use maps are then digitized into shapefile (.shp) format in ArcGIS software, spatial reference is updated to WGS1984 and accuracy assessment is performed to validate data. …”
    Get full text
    Undergraduate Final Project Report
  8. 8

    SUDOKU HELPER by Abdul Razak, Muhammad Asyraf

    Published 2015
    “…In this paper research, author presents an algorithm to provide a tutorial for any Sudoku player who got stuck during the solving process. …”
    Get full text
    Get full text
    Final Year Project
  9. 9

    A comparative study and simulation of object tracking algorithms by Ji, Yuanfa, Yin, Pan, Sun, Xiyan, Kamarul Hawari, Ghazali, Guo, Ning

    Published 2020
    “…The algorithms using convolution features and multi-features fusion algorithms have more advantages in tracking accuracy than the algorithm using a single feature, but the tracking speed will also drop rapidly. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    An efficient anomaly intrusion detection method with evolutionary neural network by Sarvari, Samira

    Published 2020
    “…The second anomaly detection method is the Evolutionary Kernel Neural Network Random Weights (EKNNRW) in order to increase the accuracy of classification. The third proposed method is a new Evolutionary Neural Network (ENN) algorithm with a combination of Genetic Algorithm and Multiverse Optimizer (GAMVO) as a training part of ANN to create efficient anomaly-based detection with low false alarm rate. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Optimizing the light gradient-boosting machine algorithm for an efficient early detection of coronary heart disease by Temidayo Oluwatosin Omotehinwa, David Opeoluwa Oyewola, Ervin Gubin Moung

    Published 2024
    “…The LightGBM algorithm was selected for its efficiency in classification tasks, and Bayesian Optimization with Tree-structured Parzen Estimator (TPE) was employed to fine-tune its hyperparameters. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Talkout : Protecting mental health application with a lightweight message encryption by Gavin Teo Juen

    Published 2022
    “…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  13. 13
  14. 14

    Computer-assisted pterygium screening system: a review by Abdani, Siti Raihanah, Zulkifley, Mohd Asyraf, Shahrimin, Mohamad Ibrani, Zulkifley, Nuraisyah Hani

    Published 2022
    “…However, with the arrival of the deep learning era, coupled with the availability of large training data, deep learning networks have replaced the conventional networks in screening for the pterygium condition. …”
    Get full text
    Get full text
    Article
  15. 15
  16. 16

    A malware analysis and detection system for mobile devices / Ali Feizollah by Ali, Feizollah

    Published 2017
    “…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications by Hydara, Isatou

    Published 2015
    “…This research work was limited to Java based web applications. In future research, the method can be extended to include other programming languages as well as other similar web application security vulnerabilities.…”
    Get full text
    Get full text
    Thesis
  18. 18

    Human activity recognition via accelerometer and gyro sensors by Tee, Jia Lin

    Published 2023
    “…To implement the data engineering system proposed, two mobile applications, SensorData and SensorDataLogger with user-friendly interfaces and intuitive functionalities are developed using Java programming language and Android Studio. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  19. 19

    Design & Development of a Robotic System Using LEGO Mindstorm by Abd Manap, Nurulfajar, Md Salim, Sani Irwan, Haron, Nor Zaidi

    Published 2006
    “…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. Ultimately, the algorithm development program designed earlier is linked up directly to the robotic model for program implementation and verification. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20

    Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system by Beg, Abul Hashem

    Published 2011
    “…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
    Get full text
    Get full text
    Thesis