Search Results - (( java implementing function algorithm ) OR ( net detection using algorithm ))
Search alternatives:
- implementing function »
- function algorithm »
- java implementing »
- using algorithm »
- net detection »
-
1
A Toolkit for Simulation of Desktop Grid Environment
Published 2014“…The prototypes will be developed using JAVA language united with a MySQL database. Core functionality of the simulator are job generation, volunteer generation, simulating algorithms, generating graphical charts and generating reports. …”
Get full text
Get full text
Final Year Project -
2
Diabetic Retinopathy Detection Model using Hybrid of U-Net and Vision Transformer Algorithms
Published 2024“…The total integration offers a robust model which helps in detecting various stages of diabetic retinopathy. We leverage the use of U-Net algorithm in image segmentation process to delineate the regions of interest in retinal images. …”
Get full text
Get full text
Get full text
Get full text
Article -
3
DEVELOPMENT OF DRIVER DROWSINESS DETECTION ALGORITHM
Published 2022“…To contribute to the existing works of driver drowsiness detection systems, this project aims to develop a more useful drowsiness detection algorithm with low complexity and high performance using Python 3.10.1 software. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
4
On the combination of adaptive neuro-fuzzy inference system and deep residual network for improving detection rates on intrusion detection
Published 2022“…To alleviate this problem, we proposed a method that combines the Adaptive Neuro-fuzzy Inference System (ANFIS) and the ResNet algorithm. This method can make use of the advantages of both the ANFIS and ResNet, and alleviate the overfitting problem of ResNet. …”
Get full text
Get full text
Get full text
Get full text
Article -
5
Fuzzy modeling using Bat Algorithm optimization for classification
Published 2018“…A Sazonov Engine which is a fuzzy java engine is use to apply Bat Algorithm in the experiment. …”
Get full text
Get full text
Get full text
Undergraduates Project Papers -
6
Comparison of performances of Jaya Algorithm and Cuckoo Search algorithm using benchmark functions
Published 2022“…This paper aims to compare the performance of two metaheuristic algorithms which are Jaya Algorithm (JA) and Cuckoo Search (CS) using some common benchmark functions. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
7
Movie recommendation system / Najwa Syamimie Hasnu
Published 2020“…PHPMyAdmin is used to store the dataset and also acts as a database for user information. The algorithm chosen was implemented using Java Programming language and was tested using Root Means Square Error (RMSE) formula.…”
Get full text
Get full text
Thesis -
8
Signal detection algorithm for cognitive radio using singular value decomposition
Published 2011Get full text
Get full text
Get full text
Conference or Workshop Item -
9
Songs Search Using Human Humming Voice
Published 2007“…The system has the functionality of humming voice recording and algorithms comparing both humming voice and song files in the system to fmd the right song. …”
Get full text
Get full text
Final Year Project -
10
Spatial Signature Algorithm (SSA): A New Approach In Countermeasuring XML Signature Wrapping Attack
Published 2024journal::journal article -
11
-
12
Multi-method diagnosis of CT images for rapid detection of intracranial hemorrhages based on deep and hybrid learning
Published 2022“…The third proposed system uses artificial neural networks (ANNs) based on the features of the GoogLeNet, ResNet-50 and AlexNet models, whose dimensions are reduced by a principal component analysis (PCA) algorithm, and then the low-dimensional features are combined with the features of the GLCM and LBP algorithms. …”
Get full text
Get full text
Get full text
Article -
13
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…J2ME phone and Symbian Operating System (OS) as the platform for the application to run. The encryption algorithm that implemented in the system is Advanced Encryption Standard (AES) with 128-bit block size and together with the SHA1 (Secure Hash Algorithm) hash functions. …”
Get full text
Get full text
Conference or Workshop Item -
14
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…E-Certificate helps eliminate many problems that is associated with physical printed certificate such costs, management, and forgery problem. Even though implementation of such E-Certificate have been implemented around the globe, it has not been implemented for workshops in UiTM. …”
Get full text
Get full text
Thesis -
15
-
16
Predicting pneumonia and region detection from X-Ray images using deep neural network
Published 2021“…The algorithm is based on the transfer learning mechanism where pretrained ResNet-50 (Convolutional Neural Network) was used followed by some custom layer for making the prediction. …”
Get full text
Get full text
Get full text
Article -
17
Deep learning-based breast cancer detection and classification using histopathology images / Ghulam Murtaza
Published 2021“…The trained EBrC-Net is used to extract discriminative features. …”
Get full text
Get full text
Get full text
Thesis -
18
Improving intrusion detection using genetic algorithm
Published 2013Get full text
Get full text
Get full text
Article -
19
Fire Detection Algorithm using Image Processing Techniques
Published 2015Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
20
Mobile machine vision for railway surveillance system using deep learning algorithm
Published 2021“…Object classification model is produced through the model training with Deep Neural Networks (DNN). The detection model used in this paper is Single-Shot multibox Detection (SSD) MobileNet detection model. …”
Get full text
Get full text
Get full text
Get full text
Proceedings
