Search Results - (( java implementation _ algorithm ) OR ( using classification cell algorithm ))
Search alternatives:
- using classification »
- java implementation »
- classification cell »
- cell algorithm »
-
1
Predicting breast cancer using ant colony optimisation / Siti Sarah Aqilah Che Ani
Published 2021“…Hence, the main purpose of this study is to develop a model of classification for breast cancer cell prediction. This study implements a machine learning algorithm called Ant Colony Optimization (ACO) algorithm to develop an accurate classification model for predicting breast cancer cells. …”
Get full text
Get full text
Student Project -
2
An Investigation of Image and Video Classification Algorithm for White Blood Cells Detection in Real Time View
Published 2015“…The new approach used in separating it by using image classification algorithm to separate the white blood cells from the blood capillaries and it will be done live from a video. …”
Get full text
Get full text
Final Year Project -
3
Immune Multiagent System for Network Intrusion Detection using Non-linear Classification Algorithm
Published 2010“…A new non classification algorithm was developed based on the danger theory model of human immune system (HIS).The abstract model of system algorithm is inspired from HIS cell mechanism mainly, the Dendritic cell behavior and T-cell mechanisms. …”
Get full text
Get full text
Get full text
Citation Index Journal -
4
Detection of acute leukaemia cells using variety of features and neural networks
Published 2011Get full text
Working Paper -
5
RSA Encryption & Decryption using JAVA
Published 2006“…Today, with online marketing, banking, healthcare and other services, even the average householder is aware of encryption. The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
6
HEP-2 CELL IMAGES CLASSIFICATION BASED ON STATISTICAL TEXTURE ANALYSIS AND FUZZY LOGIC
Published 2014“…This project proposes a pattern recognition algorithm consisting of statistical methods to extract seven textural features from the HEp-2 cell images followed by classification of staining patterns by using fuzzy logic. …”
Get full text
Get full text
Final Year Project -
7
FLUORESCENCE INTENSITY POSITIVITY CLASSIFICATION OF HEP-2 CELLS IMAGES USING FUZZY LOGIC
Published 2013Get full text
Get full text
Final Year Project -
8
Breast cancer disease classification using fuzzy-ID3 algorithm with FUZZYDBD method: automatic fuzzy database definition
Published 2021“…This paper proposed the fuzzy-ID3 (FID3) algorithm, a fuzzy decision tree as the classification method in breast cancer detection. …”
Get full text
Get full text
Get full text
Get full text
Article -
9
Provider independent cryptographic tools
Published 2003“…The library is implemented by using Java cryptographic service provider framework that conforms to Java Cryptographic Architecture (JCA) and Java Cryptographic Extension (JCE). …”
Get full text
Get full text
Get full text
Monograph -
10
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
11
Diagnosis of eyesight using Improved Clonal Selection Algorithm (ICLONALG) / Nor Khirda Masri
Published 2017“…Therefore, in order to provide the excellent eyesight’s problem care, it needs an intelligent diagnostic of the eyesight to detect the classification of eyesight diseases. This study aims to implement the classification algorithm using the Improved Clonal Selection Algorithm (ICLONALG) to classify the eyesight’s problems. …”
Get full text
Get full text
Thesis -
12
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…RSA is one of these encryption algorithms that have been implemented in security systems. …”
Get full text
Get full text
Thesis -
13
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
14
Classification of Diabetes Mellitus (DM) using Machine Learning Algorithms
Published 2021“…The objective of this study is to perform DM classification using various machine learning algorithms using Weka as a tool. …”
Get full text
Get full text
Final Year Project -
15
Red blood cells classification with sharpening segmentation and mask R-CNN
Published 2023“…This paper proposes classification using sharpening segmentation combined with the algorithm mask R-CNN to increase the accuracy of calculating the number of RBCs. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
16
Comparative Analysis of Cervical Cell Classification Using Machine Learning Algorithms
Published 2026journal::journal article -
17
Performance evaluation of real-time multiprocessor scheduling algorithms
Published 2016“…We hyave used the CPU profiler of Oracle JavaTM VisualVM to monitor the execution of LRE-TL as well as USG algorithms. …”
Get full text
Get full text
Conference or Workshop Item -
18
HEp-2 cell images classification based on statistical texture analysis and fuzzy logic
Published 2014“…This paper proposes a pattern recognition algorithm consisting of statistical methods to extract seven textural features from the HEp-2 cell images followed by classification of staining patterns by using fuzzy logic. …”
Get full text
Get full text
Conference or Workshop Item -
19
Automatic Number Plate Recognition on android platform: With some Java code excerpts
Published 2016“…The main challenges of implementing ANPR algorithm on mobile phone are how to produce a higher coding efficiency, lower computational complexity, and higher scalability. …”
Get full text
Get full text
Get full text
Book -
20
The significant effect of feature selection methods in spam risk assessment using dendritic cell algorithm
Published 2024conference output::conference proceedings::conference paper
