Search Results - (( java application model algorithm ) OR ( sequence identification method algorithm ))
Search alternatives:
- sequence identification »
- identification method »
- application model »
- java application »
- method algorithm »
- model algorithm »
-
1
-
2
Deep learning-based colorectal cancer classification using augmented and normalised gut microbiome data / Mwenge Mulenga
Published 2022“…First, to investigate the methods used to address limitations associated with microbiome-based datasets in colorectal cancer identification using deep neural network algorithms. …”
Get full text
Get full text
Get full text
Thesis -
3
-
4
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
5
Methods for identification of the opportunistic gut mycobiome from colorectal adenocarcinoma biopsy tissues
Published 2024“…•Application of machine learning algorithms to the identification of potential mycobiome biomarkers for non-invasive colorectal cancer screening. …”
Get full text
Get full text
Get full text
Article -
6
DNA motif identification using LPBS
Published 2016“…In recent years, several deoxyribonucleic acid (DNA)-based approaches have been developed for species identification including DNA sequencing. The search for motif or patterns in DNA sequences is important in many fields especially in biology. …”
Get full text
Get full text
Get full text
Article -
7
-
8
Kalman filter based impedance parameter estimation for transmission line and distribution line
Published 2019“…Most of the current algorithms for parameter identification are based on the assumption that transmission line is fully transposed and the corresponding components are symmetric. …”
Get full text
Get full text
Thesis -
9
Optimization of blood vessel detection in retina images using multithreading and native code for portable devices
Published 2013Get full text
Get full text
Conference or Workshop Item -
10
Real-time algorithmic music composition application.
Published 2022“…This project is about the study of evolutionary music, and focuses on the development of an algorithmic music composer using the Java programming language. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
11
SYSTEM IDENTIFICATION AND MODEL PREDICTIVE CONTROL FOR INTERACTING SERIES PROCESS WITH NONLINEAR DYNAMICS
Published 2009“…The subspace system identification method is used to estimate the linear model parameters. …”
Get full text
Get full text
Thesis -
12
AR oriented pose matching mechanism from motion capture data
Published 2023“…This proposed algorithm is compared with other published methods in terms of frame level accuracy and learning time of dance session. …”
Article -
13
-
14
Fingerprint recognition system
Published 2005“…Fingerprint recognition is the oldest method which has been used in numerous applications for identification purpose in many social conditions such as access control and crime investigation.Now a day,in the era of technology the system is still using the password or smart card as an identity character for identification purpose.The problems happen when user forgot their password or lost their smart card. …”
Get full text
Get full text
Undergraduates Project Papers -
15
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
16
-
17
-
18
A Toolkit for Simulation of Desktop Grid Environment
Published 2014“…In this type of environment it is nearly impossible to prove the effectiveness of a scheduling algorithm. Hence the main objective of this study is to develop a desktop grid simulator toolkit for measuring and modeling scheduler algorithm performance. …”
Get full text
Get full text
Final Year Project -
19
Genome-wide computational identification of biologically significant cis-regulatory elements and associated transcription factors from rice
Published 2019“…In this study, we tested the applicability of two algorithms developed for other model systems for the identification of biologically significant CREs of co-expressed genes from rice. …”
Get full text
Get full text
Get full text
Article -
20
Secure Image Steganography Using Encryption Algorithm
Published 2016“…The objective of this study is to enhance the confidentiality and security of the image steganography application by combining cryptography algorithm. In this proposed model, the RSA algorithm is used to encrypt a secret message into an unreadable ciphertext before hiding it in the image. …”
Get full text
Get full text
Conference or Workshop Item
