Search Results - (( java implementation during algorithm ) OR ( basic using deep algorithm ))
Search alternatives:
- implementation during »
- java implementation »
- during algorithm »
- deep algorithm »
- basic using »
-
1
Pairwise testing tools based on hill climbing algorithm (PTCA)
Published 2014“…The actual implementation of the algorithm which is in Java programming language, the program is implemented on Net Bean 7.0.1. …”
Get full text
Get full text
Undergraduates Project Papers -
2
The Role of Machine Learning and Deep Learning Approaches for the Detection of Skin Cancer
Published 2023“…Moreover, this paper also defined the basic requirements for creating a skin cancer detection application, which revolves around two main issues: the full segmentation image and the tracking of the lesion on the skin using deep learning. …”
Get full text
Get full text
Get full text
Article -
3
A stacked ensemble deep learning model for water quality prediction / Wong Wen Yee
Published 2023“…The proposed deep learning model renders faster without the use of SMOTE. …”
Get full text
Get full text
Get full text
Thesis -
4
Investigate And Analysis Of Deep Learning And Machine Learning Algorithm For Face Mask Detection System
Published 2022Get full text
Get full text
Undergraduates Project Papers -
5
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…The circuits have been designed by proteus, the microcontrollers have been programmed by micro C, and the Graphical User Interface (GUI) has been implemented in Java. Few by electronic components such as RFID, multiplexer, XBee, and servo motors have been used to realize the system. …”
Get full text
Get full text
Thesis -
6
Email spam classification based on deep learning methods: A review
Published 2025“…This review aims to identify the various deep learning techniques used for email spam, their effectiveness, and areas for future research. …”
Get full text
Get full text
Get full text
Get full text
Article -
7
A review on monocular tracking and mapping: from model-based to data-driven methods
Published 2022“…Astounding results from early methods based on filtering have intrigued the community to extend these algorithms using other forms of techniques like bundle adjustment and deep learning. …”
Get full text
Get full text
Article -
8
A Novel Method for Fashion Clothing Image Classification Based on Deep Learning
Published 2023“…Image recognition and classification is a significant research topic in computational vision and widely used computer technology. The methods often used in image classification and recognition tasks are based on deep learning, like Convolutional Neural Networks (CNNs), LeNet, and Long Short-Term Memory networks (LSTM). …”
Get full text
Get full text
Get full text
Article -
9
A novel neuroscience-inspired architecture: for computer vision applications
Published 2016Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
10
Review of Wheat Disease Classification and Severity Detection Models
Published 2023“…To combat these diseases, researchers have been studying the use of advanced techniques such as deep plant disease learning and image processing methods for identification. …”
Get full text
Get full text
Get full text
Get full text
Article -
11
Designing an integrated AIOT system for tracking class attendance
Published 2024“…Basics and ensures that the software is more secure than the previous traditional attendance method using roll-less slides. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
12
Application of genetic algorithm and JFugue in an evolutionary music generator
Published 2025“…This will involve the explanation of the use of evolution algorithms combined with the music programming to be able to create creative digital music.…”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
13
-
14
A deep learning approach: The impact of sentiment analysis of Bangladeshi workers over the world
Published 2025“…TF-IDF vectorization was used for feature extraction, followed by basic machine learning algorithms such as Decision Tree, Support Vector Machine, and Naive Bayes. …”
Get full text
Get full text
Get full text
Article -
15
Talkout : Protecting mental health application with a lightweight message encryption
Published 2022“…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
Get full text
Get full text
Get full text
Academic Exercise -
16
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…The system is capable in operating an off-line programming method, starting from its programming sequences until robotic implementation of the program. During early stages, the research is emphasis more towards designing a robotic system using RoboLab software and C++ programming language. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
17
An enhanced minimum variance distortionless response beamformer techniques to reduce interference in array antenna system
Published 2017“…Metaheuristic optimization algorithms are used widely to solve many engineering problems. …”
Get full text
Get full text
Thesis -
18
Data Hiding Techniques In Digital Images
Published 2003“…After all these studies, one of the algorithms in the masking technique is developed and implemented using JAVA program to embed message into true color image with a good quality and higher capacity. …”
Get full text
Get full text
Thesis -
19
Multi-floor indoor location estimation system based on wireless local area network
Published 2007“…Before developing the system, study on characteristics of RSS is conducted to help the design, development and implementation of the proposed system. The proposed system is then designed and developed using Java programming language. …”
Get full text
Get full text
Thesis -
20
Implementation of hashed cryptography algorithm based on cryptography message syntax
Published 2019“…The problematic message uses light blue representation in simulation. The sent message uses the red color representation in the simulation. …”
Get full text
Get full text
Get full text
Get full text
Thesis
