Search Results - (( java implementation design algorithms ) OR ( parameter activation function algorithm ))
Search alternatives:
- implementation design »
- parameter activation »
- java implementation »
- function algorithm »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…Today, with online marketing, banking, healthcare and other services, even the average householder is aware of encryption. The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
2
Provider independent cryptographic tools
Published 2003“…The library is implemented by using Java cryptographic service provider framework that conforms to Java Cryptographic Architecture (JCA) and Java Cryptographic Extension (JCE). …”
Get full text
Get full text
Get full text
Monograph -
3
Automatic Number Plate Recognition on android platform: With some Java code excerpts
Published 2016“…The main challenges of implementing ANPR algorithm on mobile phone are how to produce a higher coding efficiency, lower computational complexity, and higher scalability. …”
Get full text
Get full text
Get full text
Book -
4
Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework
Published 2004“…Java Media Framework library and the RTP protocol for audio transmission were used as development tools.The developed system designed in this thesis together with experimental results proved that the system could be implemented successfully. …”
Get full text
Get full text
Thesis -
5
Java based expert system for selection of natural fibre composite materials
Published 2013“…In this paper, we develop a technology for the materials selection system using Java based expert system. The weighted-range method (WRM) was implemented to identify the range value and to scrutinise the candidate materials. …”
Get full text
Get full text
Get full text
Article -
6
Design and Implementation of Data-at-Rest Encryption for Hadoop
Published 2017Get full text
Get full text
Conference or Workshop Item -
7
Design and Implementation of Data-at-Rest Encryption for Hadoop
Published 2017Get full text
Get full text
Conference or Workshop Item -
8
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
Get full text
Get full text
Conference or Workshop Item -
9
A Model for Evaluation of Cryptography Algorithm on UUM Portal
Published 2004“…The steps are problem definition, construct the simulation model, test and validate the model, design the simulation experiments, conduct the simulation experiments, evaluate the result and implement the result. …”
Get full text
Get full text
Get full text
Thesis -
10
PROPOSED METHODOLOGY FOR OPTIMIZING THE TRAINING PARAMETERS OF A MULTILAYER FEED-FORWARD ARTIFICIAL NEURAL NETWORKS USING A GENETIC ALGORITHM
Published 2011“…To overcome these limitations, there have been attempts to use genetic algorithm (GA) to optimize some of these parameters. …”
Get full text
Get full text
Thesis -
11
Network game (Literati) / Chung Mei Kuen
Published 2003“…The main aspect of this thesis is to produce a networked gaming system, which process players. requested to play the game and enabling users to play the graphical game with people through the network. The algorithm design and implementation method must not only be workable, but also highly efficient in terms of execution speed and response time. …”
Get full text
Get full text
Thesis -
12
Data-Driven Approach to Modeling Biohydrogen Production from Biodiesel Production Waste: Effect of Activation Functions on Model Configurations
Published 2022“…The RBFNN model with softmax as the hidden layer activation function and identity as the outer layer activation function has the least predictive performance, as indicated by an R2 of 0.403 and a RMSE of 301.55. …”
Get full text
Get full text
Article -
13
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…This methodology consist of Requirement and Planning, Design, Construction, Testing and Implementation. …”
Get full text
Get full text
Thesis -
14
-
15
Songs Search Using Human Humming Voice
Published 2007“…The scopes for this project are human humming voice, voice capture in WA V format, songs database, and MIDI file comparing algorithm. Methodologies used in this system are based on system analysis and design methodology comprising planning, analysis, design and implementation. …”
Get full text
Get full text
Final Year Project -
16
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
Get full text
Get full text
Thesis -
17
The PID controller parameter tuning based on a modified differential evolutionary optimization algorithm for the intelligent active vibration control of a combined single link robo...
Published 2025“…Here, in this research by comprising three of the most effective variational techniques now, a Modified Differential Evolutionary Optimization Algorithm (MDEOA) method is suggested to handle the challenge of adjusting the PID controller parameters for the Intelligent Active Vibration Control (IAVC) of a Combined Single Link Robotics Flexible Manipulator (CSLRFM) in order to reduce the undesired effects of vibration. …”
Get full text
Get full text
Get full text
Article -
18
The effect of adaptive parameters on the performance of back propagation
Published 2012“…The activation functions are adjusted by the adaptation of gain parameters together with adaptive momentum and learning rate value during the learning process. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
19
A harmony search-based learning algorithm for epileptic seizure prediction
Published 2016“…The learning phase of wavelet neural network entails the task of finding the optimal set of parameter, which includes wavelet activation function, translation centers, dilation parameter, synaptic weight values, and bias terms. …”
Get full text
Get full text
Article -
20
Decentralized Adaptive Pi With Adaptive Interaction Algorithm Of Wastewater Treatment Plant
Published 2014“…The error function is minimized directly by approximate Frechet tuning algorithm without explicit estimation of the model. …”
Get full text
Get full text
Get full text
Article
