Search Results - (( java implementation model algorithm ) OR ( automatic identification learning algorithm ))
Search alternatives:
- identification learning »
- implementation model »
- java implementation »
- learning algorithm »
- model algorithm »
-
1
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…RSA is one of these encryption algorithms that have been implemented in security systems. …”
Get full text
Get full text
Thesis -
2
The efficacy of deep learning algorithm in classifying chilli plant growth stages
Published 2021“…In this paper, the efficiency of deep learning algorithms in classifying the growth stage of chili plants is studied. …”
Get full text
Get full text
Get full text
Article -
3
Provider independent cryptographic tools
Published 2003“…The library is implemented by using Java cryptographic service provider framework that conforms to Java Cryptographic Architecture (JCA) and Java Cryptographic Extension (JCE). …”
Get full text
Get full text
Get full text
Monograph -
4
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
5
Deep learning approaches, platforms, datasets for behavior based recognition: a survey
Published 2025“…We attempt to classify current research work to report the ongoing trends in human behavior recognition using deep learning algorithms. This paper reviews various aspects, like the ones associated with machine learning and deep learning models, human activity recognition (HAR), deep learning frameworks/tools, abnormal behavior datasets, and a variety of other current trends in the field of automatic learning. …”
Get full text
Get full text
Get full text
Article -
6
-
7
-
8
Study Of Modified Training Algorithm For Optimized Convergence Speed Of Neural Network
Published 2016“…First proposed algorithm is the combination of momentum algorithm with adaptive learning rate (ALR) algorithm, and second proposed algorithm is the combination of momentum algorithm with automatic learning rate selection (ALRS) algorithm. …”
Get full text
Get full text
Thesis -
9
Automatic identification of epileptic seizures from EEG signals using sparse representation-based classification
Published 2020“…In this research, a fully automated system is presented to automatically detect the various states of the epileptic seizure. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
10
Deep learning approaches, platforms, datasets for behavior based recognition: a survey
Published 2025“…We attempt to classify current research work to report the ongoing trends in human behavior recognition using deep learning algorithms. This paper reviews various aspects, like the ones associated with machine learning and deep learning models, human activity recognition (HAR), deep learning frameworks/tools, abnormal behavior datasets, and a variety of other current trends in the field of automatic learning. …”
Get full text
Get full text
Get full text
Article -
11
Optimization of blood vessel detection in retina images using multithreading and native code for portable devices
Published 2013“…The performance of Java programming model and native programming model are compared with respect to the execution time for blood vessel detection. …”
Get full text
Get full text
Conference or Workshop Item -
12
Rockfall source identification using a hybrid Gaussian mixture-ensemble machine learning model and LiDAR data
Published 2019“…The availability of high-resolution laser scanning data and advanced machine learning algorithms has enabled an accurate potential rockfall source identification. …”
Get full text
Get full text
Get full text
Article -
13
A Toolkit for Simulation of Desktop Grid Environment
Published 2014“…A simulator for desktop grid environment has been developed using Java as the implementation language due to its wide popularity. …”
Get full text
Get full text
Final Year Project -
14
-
15
A Model for Evaluation of Cryptography Algorithm on UUM Portal
Published 2004“…The methodology used in this study begun with problem identification, requirement identification, analysed the model process and design the simulation model. The simulation model was developed using Active Server Page, JavaScript and SQL 7.0 as database. …”
Get full text
Get full text
Get full text
Thesis -
16
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
17
Multi-sensor fusion and deep learning framework for automatic human activity detection and health monitoring using motion sensor data / Henry Friday Nweke
Published 2019“…Third, to propose orientation invariant based deep spare autoencoder methods for automatic complex activity identification to minimize orientation inconsistencies and learn adequate data patterns. …”
Get full text
Get full text
Get full text
Thesis -
18
Dyslexia handwriting detection using Convolutional Neural Network (CNN) algorithm / Sofea Najihah Mohd Zaki
Published 2024“…Convolutional Neural Network (CNN) algorithm was chosen as one of the possible solutions after a thorough analysis of many algorithms for dyslexic handwriting identification. …”
Get full text
Get full text
Thesis -
19
Parallel distributed genetic algorithm development based on microcontrollers framework
Published 2023Conference paper -
20
Age detection from face using Convolutional Neural Network (CNN) / Hanin Hanisah Usok @ Yusoff
Published 2024“…In this project, we want to create an age identification system that uses Convolutional Neural Network (CNN) algorithms to estimate people's ages fast and accurately from facial images. …”
Get full text
Get full text
Thesis
