Search Results - (( java implementation using algorithm ) OR ( using pca based algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2
  3. 3

    Provider independent cryptographic tools by Ibrahim, Subariah, Salleh, Mazleena, Abdul Aziz, Shah Rizan

    Published 2003
    “…The library is implemented by using Java cryptographic service provider framework that conforms to Java Cryptographic Architecture (JCA) and Java Cryptographic Extension (JCE). …”
    Get full text
    Get full text
    Get full text
    Monograph
  4. 4

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Performance evaluation of real-time multiprocessor scheduling algorithms by Alhussian, H., Zakaria, N., Abdulkadir, S.J., Fageeri, S.O.

    Published 2016
    “…We hyave used the CPU profiler of Oracle JavaTM VisualVM to monitor the execution of LRE-TL as well as USG algorithms. …”
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    Automatic Number Plate Recognition on android platform: With some Java code excerpts by ., Abdul Mutholib, Gunawan, Teddy Surya, Kartiwi, Mira

    Published 2016
    “…On the other hand, the traditional algorithm using template matching only obtained 83.65% recognition rate with 0.97 second processing time. …”
    Get full text
    Get full text
    Get full text
    Book
  8. 8

    Anomaly detection in system log files using machine learning algorithms / Zahedeh Zamanian by Zahedeh, Zamanian

    Published 2019
    “…Also, log files are heterogenous and cannot fed them directly in machine learning algorithms. Furthermore, many of the companies use the signature-based detection method which is not capable of capturing more advanced attackers that use unfamiliar attacks methods. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework by Asaad Aref, Ibrahim

    Published 2004
    “…Java Media Framework library and the RTP protocol for audio transmission were used as development tools.The developed system designed in this thesis together with experimental results proved that the system could be implemented successfully. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Register Transfer Level Implementation Of Pooling - Based Feature Extraction For Finger Vein Identification by Mohamed Ali, Mohamed Hassan

    Published 2017
    “…The algorithm was mainly inspired by spatial pyramid pooling in generic image classification combined with PCA. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Modeling and validation of base pressure for aerodynamic vehicles based on machine learning models by Quadros, Jaimon Dennis, Khan, Sher Afghan, Aabid, Abdul, Baig, Muneer

    Published 2023
    “…In this work, the optimal base pressure is determined using the PCA-BAS-ENN-based algorithm to modify the base pressure presetting accuracy, thereby regulating the base drag required for the smooth flow of aerodynamic vehicles. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    A region-based Principal Component Analysis (PCA) technique for medical image compression by Lim, Sin Ting

    Published 2022
    “…The research has successfully developed an improved region-based compression scheme for medical images where lossy and lossless compression is implemented in one PCA architecture. …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    The performance of k-means clustering method based on robust principal components by Kadom, Ahmed, Midi, Habshah, Rana, Sohel

    Published 2018
    “…To remedy this problem, we proposed to integrate robust principal component analysis (RPCA) with the k-means algorithm. Simulation study and real examples are carried out to compare the performance of the classical k-means, k-means based on PCA and k-means based on RPCA. …”
    Get full text
    Get full text
    Article
  14. 14

    Performance analysis of robust road sign identification by Mohd Ali, Nursabillilah

    Published 2013
    “…For successful recognition rates using PCA can be achieved in the range of 94-98%. …”
    Get full text
    Get full text
    Article
  15. 15

    Towards Practical Face Recognition System Employing Row-Based Distance Method In 2dpca Based Algorithms by Al-Arashi, Waled Hussein Mohammed

    Published 2014
    “…One of the most important extensions of PCA is Two-dimensional PCA (2DPCA). However, 2DPCA-based features are matrices rather than vectors as in PCA. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Adaptive Pca-Based Models To Reconstruct 3d Faces From Single 2d Images by Maghari, Ashraf Y. A.

    Published 2014
    “…Example-based statistical face models using Principle Component Analysis (PCA) have been widely used for 3D face reconstruction and face recognition. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Optimal Weighted Learning of PCA and PLS for Multicollinearity Discriminators and Imbalanced Groups in Big Data (S/O: 13224) by Mahat, Nor Idayu, Engku Abu Bakar, Engku Muhammad Nazri, Zakaria, Ammar, Mohd Nazir, Mohd Amril Nurman, Misiran, Masnita

    “…Then, the weights are used together with either Principal Component Analysis (PCA) or Partial Least Square (PLS) to tackle the collinearity among variables. …”
    Get full text
    Get full text
    Monograph
  18. 18
  19. 19

    Face identification and verification using PCA and LDA by Chan, Lih Heng, Shaikh Salleh, Sheikh Hussain, Ting, Chee Ming, Ariff, Ahmad Kamarul

    Published 2008
    “…Algorithms based on PCA (Principal Components Analysis) and LDA (Linear Discriminant Analysis) are among the most popular appearance-based approaches in face recognition. …”
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20

    An Integrated Principal Component Analysis And Weighted Apriori-T Algorithm For Imbalanced Data Root Cause Analysis by Ong, Phaik Ling

    Published 2016
    “…The proposed PCA-WAT algorithm is benchmarked with the Apriori and Apriori-T algorithms.Comparison analysis on weighted support has been performed to evaluate the capability of PCA in normalising item’s support value. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis