Search Results - (( java application modified algorithm ) OR ( after implementation learning algorithm ))
Search alternatives:
- implementation learning »
- application modified »
- after implementation »
- learning algorithm »
- java application »
-
1
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
2
Autonomous path planning robot using geographical information
Published 2008Get full text
Learning Object -
3
Jogging activity recognition using k-NN algorithm
Published 2022“…The k-NN algorithm is a simple and easy-to-implement supervised machine learning algorithm that can be used to solve both classification and regression problems. …”
Get full text
Get full text
Get full text
Academic Exercise -
4
Cyberbullying detection: a machine learning approach
Published 2022“…Machine learning is a hot topic and it is widely implemented in software, web application and more. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
5
Music Recommender System Using Machine Learning Content-Based Filtering Technique
Published 2022“…In this study, methods of K-Mean Clustering, Euclidean Distance and Cosine Similarity are implemented. These are the popular algorithm for unsupervised learning, a machine learning method to analyse and cluster datasets. …”
Get full text
Get full text
Undergraduates Project Papers -
6
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…A GUI is created in a form of JAVA application to display data detected from tag. …”
Get full text
Get full text
Thesis -
7
Effects of Different Pre-Trained Deep Learning Algorithms as Feature Extractor in Tomato Plant Health Classification
Published 2023“…This study proposes a system that can classify tomato plant health into five categories of healthy, early blight, late blight, bacterial spot, and yellow leaf curl virus based on their leaves using deep learning algorithms as feature extractors. Five different pre-trained deep learning algorithms (i.e. …”
Get full text
Get full text
Get full text
Article -
8
Automatic generation of content security policy to mitigate cross site scripting
Published 2016“…The algorithm is implemented as a plugin. It does not interfere with the web application original code. …”
Get full text
Get full text
Conference or Workshop Item -
9
Phishing attack detection using machine learning method
Published 2019“…The study of this algorithm is made thoroughly and the methods in implementing this algorithm have been discussed in detail. …”
Get full text
Get full text
Get full text
Undergraduates Project Papers -
10
-
11
Effects of Different Pre-Trained Deep Learning Algorithms as Feature Extractor in Tomato Plant Health Classification
Published 2023“…This study proposes a system that can classify tomato plant health into five categories of healthy, early blight, late blight, bacterial spot, and yellow leaf curl virus based on their leaves using deep learning algorithms as feature extractors. Five different pre-trained deep learning algorithms (i.e. …”
Get full text
Get full text
Get full text
Article -
12
Effects of Different Pre-Trained Deep Learning Algorithms as Feature Extractor in Tomato Plant Health Classification
Published 2023“…This study proposes a system that can classify tomato plant health into five categories of healthy, early blight, late blight, bacterial spot, and yellow leaf curl virus based on their leaves using deep learning algorithms as feature extractors. Five different pre-trained deep learning algorithms (i.e. …”
Get full text
Get full text
Get full text
Article -
13
Effects of Different Pre-Trained Deep Learning Algorithms as Feature Extractor in Tomato Plant Health Classification
Published 2023“…This study proposes a system that can classify tomato plant health into five categories of healthy, early blight, late blight, bacterial spot, and yellow leaf curl virus based on their leaves using deep learning algorithms as feature extractors. Five different pre-trained deep learning algorithms (i.e. …”
Get full text
Get full text
Get full text
Article -
14
A conceptual model for the E-commerce application recommendation framework using exploratory search
Published 2024journal::journal article -
15
-
16
Development of lung cancer prediction system using meta-heuristic optimized deep learning model
Published 2023“…Finally, the classification is implemented using an ensemble classifier, deep learning instantaneously trained a neural network and an Autoencoder-based Recurrent Neural Network (ARNN) classification algorithm. …”
Get full text
Get full text
Get full text
Thesis -
17
Age And Gender Recognition Mobile App
Published 2023“…Therefore, this study aimed to develop age and gender recognition mobile application using deep learning algorithm. After reviewing existing age and gender recognition mobile app, Convolutional Neural Network (CNN), one of the deep learning algorithms is implement in this proposed system. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
18
Implementing server-side federated learning in an edge-cloud framework for precision aquaculture
Published 2025“…After identifying the gaps in current systems, this project proposes a secure and scalable server-side federated learning framework in an edge-cloud architecture for precision aquaculture. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
19
Particle Swarm Optimization in Machine Learning Prediction of Airbnb Hospitality Price Prediction
Published 2022“…Particle Swarm Optimization is a meta-heuristics algorithm widely used for optimization problems. This paper presents the research design and implementation of using Particle Swarm Optimization to automate the features selections in the machine learning models for Airbnb price prediction. …”
Get full text
Get full text
Article -
20
Multi-modal association learning using spike-timing dependent plasticity (STDP)
Published 2014“…In our learning, we implement learning for response group association by following the reward-modulated STDP in terms of RL, wherein the firing rate of the response groups determines the reward that will be given. …”
Get full text
Get full text
Get full text
Thesis
