Search Results - (( java application during algorithm ) OR ( sequence classification matching algorithm ))
Search alternatives:
- sequence classification »
- classification matching »
- application during »
- java application »
- during algorithm »
-
1
Block Motion Estimation Using Directional Adaptive Search Window
Published 2006“…The proposed algorithm determines the amount of motion in past frames and classifies the video sequence as having low, medium or high motion. …”
Get full text
Get full text
Conference or Workshop Item -
2
Improved GART neural network model for pattern classification and rule extraction with application to power systems
Published 2023“…IGART enhances the dynamics of GART in several aspects, which include the use of the Laplacian likelihood function, a new vigilance function, a new match-tracking mechanism, an ordering algorithm for determining the sequence of training data, and a rule extraction capability to elicit if-then rules from the network. …”
Article -
3
-
4
Block motion estimation using directional adaptive search window
Published 2007“…The proposed algorithm determines the amount of motion in past frames and classifies the video sequence as having low, medium or high motion. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
Development and application of an enhanced ART-Based neural network
Published 2009Get full text
Working Paper -
6
Detection of Workers’ Behaviour in the Manufacturing Plant using Deep Learning
Published 2023“…Utilizing machine learning algorithms, our system learns and detects intricate activities from worker behavior sequences, offering a sophisticated analysis of worker efficiency. …”
Get full text
Get full text
Get full text
Get full text
Article -
7
Android: S-Based Technique in Mobile Malware Detection
Published 2018“…In order to overcome malware, concern in mobile, we propose a new framework for malware detection which is signature based technique using pattern matching. This framework uses signature number and Secure Hash Algorithm (SHA) as signature in the detection process. …”
Get full text
Get full text
Get full text
Article -
8
SUDOKU HELPER
Published 2015“…In this paper research, author presents an algorithm to provide a tutorial for any Sudoku player who got stuck during the solving process. …”
Get full text
Get full text
Final Year Project -
9
Talkout : Protecting mental health application with a lightweight message encryption
Published 2022“…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
Get full text
Get full text
Get full text
Academic Exercise -
10
A study on component-based technology for development of complex bioinformatics software
Published 2004“…Secondly, segment protein sequences into nine continuous length of protein subsequence. …”
Get full text
Get full text
Monograph -
11
-
12
-
13
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis -
14
An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications
Published 2015“…This research work was limited to Java based web applications. In future research, the method can be extended to include other programming languages as well as other similar web application security vulnerabilities.…”
Get full text
Get full text
Thesis -
15
Human activity recognition via accelerometer and gyro sensors
Published 2023“…To implement the data engineering system proposed, two mobile applications, SensorData and SensorDataLogger with user-friendly interfaces and intuitive functionalities are developed using Java programming language and Android Studio. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
16
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. Ultimately, the algorithm development program designed earlier is linked up directly to the robotic model for program implementation and verification. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
17
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis
