Search Results - (( java application modified algorithm ) OR ( sequence classification matching algorithm ))
Search alternatives:
- sequence classification »
- classification matching »
- application modified »
- java application »
-
1
Block Motion Estimation Using Directional Adaptive Search Window
Published 2006“…The proposed algorithm determines the amount of motion in past frames and classifies the video sequence as having low, medium or high motion. …”
Get full text
Get full text
Conference or Workshop Item -
2
Improved GART neural network model for pattern classification and rule extraction with application to power systems
Published 2023“…IGART enhances the dynamics of GART in several aspects, which include the use of the Laplacian likelihood function, a new vigilance function, a new match-tracking mechanism, an ordering algorithm for determining the sequence of training data, and a rule extraction capability to elicit if-then rules from the network. …”
Article -
3
-
4
Block motion estimation using directional adaptive search window
Published 2007“…The proposed algorithm determines the amount of motion in past frames and classifies the video sequence as having low, medium or high motion. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
6
Development and application of an enhanced ART-Based neural network
Published 2009Get full text
Working Paper -
7
Detection of Workers’ Behaviour in the Manufacturing Plant using Deep Learning
Published 2023“…Utilizing machine learning algorithms, our system learns and detects intricate activities from worker behavior sequences, offering a sophisticated analysis of worker efficiency. …”
Get full text
Get full text
Get full text
Get full text
Article -
8
Android: S-Based Technique in Mobile Malware Detection
Published 2018“…In order to overcome malware, concern in mobile, we propose a new framework for malware detection which is signature based technique using pattern matching. This framework uses signature number and Secure Hash Algorithm (SHA) as signature in the detection process. …”
Get full text
Get full text
Get full text
Article -
9
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…A GUI is created in a form of JAVA application to display data detected from tag. …”
Get full text
Get full text
Thesis -
10
Automatic generation of content security policy to mitigate cross site scripting
Published 2016“…The algorithm is implemented as a plugin. It does not interfere with the web application original code. …”
Get full text
Get full text
Conference or Workshop Item -
11
A study on component-based technology for development of complex bioinformatics software
Published 2004“…Secondly, segment protein sequences into nine continuous length of protein subsequence. …”
Get full text
Get full text
Monograph -
12
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis -
13
