Search Results - (( java implementation _ algorithm ) OR ( brain computing learning algorithm ))

Refine Results
  1. 1

    Brain tumor image segmentation using deep learning approach by Darshan, Suresh

    Published 2022
    “…Deep learning algorithm is able to provide good tumor segmentation results compared to other conventional segmentation algorithms as it learns from the labeled brain MRIs to predict the location of tumor region and consequently segment the tumor. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  2. 2
  3. 3

    Data-driven brain emotional learning-based intelligent controller-PID control of MIMO systems based on a modified safe experimentation dynamics algorithm by Shahrizal, Saat, Mohd Ashraf, Ahmad, Mohd Riduwan, Ghazali

    Published 2025
    “…Furthermore, the low computational burden of MSEDA rendered it a strong alternative to heuristic multi-agent algorithms, which frequently encounter high computational costs with large controller design parameters.…”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Data-driven brain emotional learning-based intelligent controller-PID control of MIMO systems based on a modified safe experimentation dynamics algorithm by Shahrizal, Saat, Mohd Ashraf, Ahmad, Mohd Riduwan, Ghazali

    Published 2025
    “…Furthermore, the low computational burden of MSEDA rendered it a strong alternative to heuristic multi-agent algorithms, which frequently encounter high computational costs with large controller design parameters.…”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Learner’s emotion prediction using production rules classification algorithm through brain computer interface tool by Nurshafiqa Saffah, Mohd Sharif

    Published 2018
    “…The use of sensors known as Brain-Computer Interface (BCI) tool can monitor the physical processes and mental states that occur in the human brain. …”
    Get full text
    Get full text
    Thesis
  6. 6

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…Today, with online marketing, banking, healthcare and other services, even the average householder is aware of encryption. The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
    Get full text
    Get full text
    Final Year Project
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11

    Brain tumor MRI medical images classification with data augmentation by transfer learning of VGG16 by Ahmed Yahya Al-Galal, Sabaa, Taha Alshaikhli, Imad Fakhri, Abdulrazzaq, M. M., Hassan, Raini

    Published 2021
    “…The ability to estimate conclusions without direct human input in healthcare systems via computer algorithms is known as Artificial intelligence (AI) in healthcare. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Applying SAX-based time series analysis to classify EEG signal using a COTS EEG device by Shanmuga, Pillai A/L Murutha Muthu

    Published 2021
    “…One of the proposals that could help solve this problem is the use of brain-computer interface (BCI)s. Brain-Computer Interface (BCI) can be used as a direct communication path between the brain and an external device. …”
    Get full text
    Thesis
  13. 13

    An improved diagnostic algorithm based on deep learning for ischemic stroke detection in posterior fossa by Muhd Suberi, Anis Azwani

    Published 2020
    “…Ischemic stroke is triggered by an obstruction in the blood vessel of the brain, preventing the blood to flow to the brain tissues region. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15

    Provider independent cryptographic tools by Ibrahim, Subariah, Salleh, Mazleena, Abdul Aziz, Shah Rizan

    Published 2003
    “…The library is implemented by using Java cryptographic service provider framework that conforms to Java Cryptographic Architecture (JCA) and Java Cryptographic Extension (JCE). …”
    Get full text
    Get full text
    Get full text
    Monograph
  16. 16

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  17. 17

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…RSA is one of these encryption algorithms that have been implemented in security systems. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    Classification of multichannel EEG signal by single layer perceptron learning algorithm by Hasan, Mohammad Rubaiyat, Ibrahimy, Muhammad Ibn, Motakabber, S. M. A., Shahid, Shahjahan

    Published 2014
    “…Motor imagery (MI) related Electroencephalogram (EEG) signal classification is one of the main challenge in designing a brain computer interface (BCI) system. Single Layer Perceptron Learning (SLPL) algorithm has a very low computational requirement which makes it suitable for online BCI system. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  20. 20