Search Results - (( java application model algorithm ) OR ( sequence identification method algorithm ))

Refine Results
  1. 1
  2. 2

    Deep learning-based colorectal cancer classification using augmented and normalised gut microbiome data / Mwenge Mulenga by Mwenge , Mulenga

    Published 2022
    “…First, to investigate the methods used to address limitations associated with microbiome-based datasets in colorectal cancer identification using deep neural network algorithms. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4
  5. 5

    Methods for identification of the opportunistic gut mycobiome from colorectal adenocarcinoma biopsy tissues by Aisyah, Yunus, Norfilza, Mohd Mokhtar, Raja Affendi, Raja Ali *, Siti Maryam, Ahmad Kendong, Hajar, Fauzan Ahmad

    Published 2024
    “…•Application of machine learning algorithms to the identification of potential mycobiome biomarkers for non-invasive colorectal cancer screening. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    DNA motif identification using LPBS by Harun, Hazaruddin, Syed Abdullah, Sharifah Lailee, Hambali, Hamirul ’Aini

    Published 2016
    “…In recent years, several deoxyribonucleic acid (DNA)-based approaches have been developed for species identification including DNA sequencing. The search for motif or patterns in DNA sequences is important in many fields especially in biology. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7
  8. 8

    Kalman filter based impedance parameter estimation for transmission line and distribution line by Siti Nur Aishah, Mohd Amin

    Published 2019
    “…Most of the current algorithms for parameter identification are based on the assumption that transmission line is fully transposed and the corresponding components are symmetric. …”
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10

    Real-time algorithmic music composition application. by Yap, Alisa Yi Hui

    Published 2022
    “…This project is about the study of evolutionary music, and focuses on the development of an algorithmic music composer using the Java programming language. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  11. 11

    SYSTEM IDENTIFICATION AND MODEL PREDICTIVE CONTROL FOR INTERACTING SERIES PROCESS WITH NONLINEAR DYNAMICS by SETYO WIBOWO, TRI CHANDRA

    Published 2009
    “…The subspace system identification method is used to estimate the linear model parameters. …”
    Get full text
    Get full text
    Thesis
  12. 12

    AR oriented pose matching mechanism from motion capture data by Iqbal J., Sidhu M.S., Ariff M.B.M.

    Published 2023
    “…This proposed algorithm is compared with other published methods in terms of frame level accuracy and learning time of dance session. …”
    Article
  13. 13
  14. 14

    Fingerprint recognition system by Rohani, Abu Bakar

    Published 2005
    “…Fingerprint recognition is the oldest method which has been used in numerous applications for identification purpose in many social conditions such as access control and crime investigation.Now a day,in the era of technology the system is still using the password or smart card as an identity character for identification purpose.The problems happen when user forgot their password or lost their smart card. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  15. 15
  16. 16
  17. 17
  18. 18

    A Toolkit for Simulation of Desktop Grid Environment by FOROUSHAN, PAYAM CHINI

    Published 2014
    “…In this type of environment it is nearly impossible to prove the effectiveness of a scheduling algorithm. Hence the main objective of this study is to develop a desktop grid simulator toolkit for measuring and modeling scheduler algorithm performance. …”
    Get full text
    Get full text
    Final Year Project
  19. 19

    Genome-wide computational identification of biologically significant cis-regulatory elements and associated transcription factors from rice by Ho, Chai Ling, Geisler, Matt

    Published 2019
    “…In this study, we tested the applicability of two algorithms developed for other model systems for the identification of biologically significant CREs of co-expressed genes from rice. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…The objective of this study is to enhance the confidentiality and security of the image steganography application by combining cryptography algorithm. In this proposed model, the RSA algorithm is used to encrypt a secret message into an unreadable ciphertext before hiding it in the image. …”
    Get full text
    Get full text
    Conference or Workshop Item