Search Results - (( java application system algorithm ) OR ( data generation learning algorithm ))
Search alternatives:
- generation learning »
- learning algorithm »
- java application »
- system algorithm »
- data generation »
-
1
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…An Intrusion Detection System is software or application which is used to detect thread, malicious activities and the unauthorized access to the computer system and warn the administrators by generating alarms. …”
Get full text
Get full text
Thesis -
2
-
3
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
4
-
5
New Learning Models for Generating Classification Rules Based on Rough Set Approach
Published 2000“…Also, the proposed models for learning in data sets generated the classification rules faster than other methods. …”
Get full text
Get full text
Thesis -
6
Real-time algorithmic music composition application.
Published 2022“…In addition, the system also utilises JavaFx and jFugue for its graphical user interface and music programming respectively. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
7
Route Optimization System
Published 2005“…After much research into the many algorithms available, and considering some, including Genetic Algorithm (GA), the author selected Dijkstra's Algorithm (DA). …”
Get full text
Get full text
Final Year Project -
8
-
9
Optimization of blood vessel detection in retina images using multithreading and native code for portable devices
Published 2013Get full text
Get full text
Conference or Workshop Item -
10
Prediction of hydropower generation via machine learning algorithms at three Gorges Dam, China
Published 2024“…Therefore, this study investigates the capability of various machine learning algorithms in predicting the power production of a reservoir located in China using data from 1979 to 2016. …”
Article -
11
-
12
Unsupervised learning of image data using generative adversarial network
Published 2020“…Based on the results obtained, the GAN algorithm can learn the internal representation of data without labels and can act as good features extractor. …”
Get full text
Get full text
Get full text
Get full text
Proceedings -
13
Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework
Published 2004“…Java Media Framework library and the RTP protocol for audio transmission were used as development tools.The developed system designed in this thesis together with experimental results proved that the system could be implemented successfully. …”
Get full text
Get full text
Thesis -
14
Small Dataset Learning In Prediction Model Using Box-Whisker Data Transformation
Published 2020“…From the previous studies, there are solutions to improve learning accuracy and predictive capability where some artificial data will be added to the system using artificial data generation approach. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
15
-
16
An optimized variant of machine learning algorithm for datadriven electrical energy efficiency management (D2EEM)
Published 2024“…The scope of this study is tri folded, First, an exhaustive and parametric comparative study on a wide variety of machine learning algorithms is presented to evaluate the performance of machine learning algorithms in energy load prediction. …”
Get full text
Get full text
Thesis -
17
Graph-Based Algorithm With Self-Weighted And Adaptive Neighbours Learning For Multi-View Clustering
Published 2024“…Although the swmcan algorithm solves the noise problem in multi-view data, its initial and final graphs are independent and cannot learn from each other. …”
Get full text
Get full text
Thesis -
18
Pairwise Test Suite Generation Using Adaptive Teaching Learning-Based Optimization Algorithm with Remedial Operator
Published 2019Get full text
Get full text
Get full text
Conference or Workshop Item -
19
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
20
A Denoising Generative Adversarial Network Based On Enhanced Feature Mapping Of Data Augmentation For Image Synthesis
Published 2024“…This requires the generator to learn how to generate images from partially damaged data, leading to better representations learned from the data. …”
Get full text
Get full text
Thesis
