Search Results - (( java implementation models algorithm ) OR ( using pca based algorithm ))
Search alternatives:
- implementation models »
- java implementation »
- models algorithm »
- using pca »
-
1
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…RSA is one of these encryption algorithms that have been implemented in security systems. …”
Get full text
Get full text
Thesis -
2
Provider independent cryptographic tools
Published 2003“…The library is implemented by using Java cryptographic service provider framework that conforms to Java Cryptographic Architecture (JCA) and Java Cryptographic Extension (JCE). …”
Get full text
Get full text
Get full text
Monograph -
3
-
4
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
5
Optimization of blood vessel detection in retina images using multithreading and native code for portable devices
Published 2013“…The performance of Java programming model and native programming model are compared with respect to the execution time for blood vessel detection. …”
Get full text
Get full text
Conference or Workshop Item -
6
Anomaly detection in system log files using machine learning algorithms / Zahedeh Zamanian
Published 2019“…Also, log files are heterogenous and cannot fed them directly in machine learning algorithms. Furthermore, many of the companies use the signature-based detection method which is not capable of capturing more advanced attackers that use unfamiliar attacks methods. …”
Get full text
Get full text
Get full text
Thesis -
7
A Toolkit for Simulation of Desktop Grid Environment
Published 2014“…A simulator for desktop grid environment has been developed using Java as the implementation language due to its wide popularity. …”
Get full text
Get full text
Final Year Project -
8
Register Transfer Level Implementation Of Pooling - Based Feature Extraction For Finger Vein Identification
Published 2017“…The algorithm was mainly inspired by spatial pyramid pooling in generic image classification combined with PCA. …”
Get full text
Get full text
Thesis -
9
Modeling and validation of base pressure for aerodynamic vehicles based on machine learning models
Published 2023“…In this work, the optimal base pressure is determined using the PCA-BAS-ENN-based algorithm to modify the base pressure presetting accuracy, thereby regulating the base drag required for the smooth flow of aerodynamic vehicles. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
10
A region-based Principal Component Analysis (PCA) technique for medical image compression
Published 2022“…The research has successfully developed an improved region-based compression scheme for medical images where lossy and lossless compression is implemented in one PCA architecture. …”
Get full text
Get full text
Get full text
Thesis -
11
The performance of k-means clustering method based on robust principal components
Published 2018“…To remedy this problem, we proposed to integrate robust principal component analysis (RPCA) with the k-means algorithm. Simulation study and real examples are carried out to compare the performance of the classical k-means, k-means based on PCA and k-means based on RPCA. …”
Get full text
Get full text
Article -
12
Performance analysis of robust road sign identification
Published 2013“…For successful recognition rates using PCA can be achieved in the range of 94-98%. …”
Get full text
Get full text
Article -
13
-
14
Towards Practical Face Recognition System Employing Row-Based Distance Method In 2dpca Based Algorithms
Published 2014“…One of the most important extensions of PCA is Two-dimensional PCA (2DPCA). However, 2DPCA-based features are matrices rather than vectors as in PCA. …”
Get full text
Get full text
Thesis -
15
A Model for Evaluation of Cryptography Algorithm on UUM Portal
Published 2004“…The methodology used in this study begun with problem identification, requirement identification, analysed the model process and design the simulation model. The simulation model was developed using Active Server Page, JavaScript and SQL 7.0 as database. …”
Get full text
Get full text
Get full text
Thesis -
16
Adaptive Pca-Based Models To Reconstruct 3d Faces From Single 2d Images
Published 2014“…Example-based statistical face models using Principle Component Analysis (PCA) have been widely used for 3D face reconstruction and face recognition. …”
Get full text
Get full text
Thesis -
17
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
18
Optimal Weighted Learning of PCA and PLS for Multicollinearity Discriminators and Imbalanced Groups in Big Data (S/O: 13224)
“…Then, the weights are used together with either Principal Component Analysis (PCA) or Partial Least Square (PLS) to tackle the collinearity among variables. …”
Get full text
Get full text
Monograph -
19
Improved robust principal component analysis based on minimum regularized covariance determinant for the detection of high leverage points in high dimensional data
Published 2025“…However, the MRCD-PCA algorithm is quite cumbersome and required longer computational running time. …”
Get full text
Get full text
Get full text
Article -
20
Face identification and verification using PCA and LDA
Published 2008“…Algorithms based on PCA (Principal Components Analysis) and LDA (Linear Discriminant Analysis) are among the most popular appearance-based approaches in face recognition. …”
Get full text
Get full text
Conference or Workshop Item
