Search Results - (( java implication based algorithm ) OR ( net implementation some algorithm ))
Search alternatives:
- implementation some »
- net implementation »
- implication based »
- java implication »
- some algorithm »
-
1
Implementation of RIO in UMJaNetSim / Chan Chin We
Published 2004“…In this project, I will do some research on the recent TCP congestion control and avoidance mechanisms and implement one of the mechanisms into the Java Network Simulator (JaNetSim). …”
Get full text
Get full text
Thesis -
2
Immune-based technique for undergraduate programmes recommendation / Muhammad Azrill Mohd Zamri
Published 2017“…The proposed technique is obtained by combining artificial immune network (aiNET) and clonal selection algorithm (CLONALG). Myers-Briggs Type Indicator is also used as a psychological assessment mechanism in the selection process to enhance the accuracy of the proposed technique. …”
Get full text
Get full text
Thesis -
3
A hybrid algorithm based on artificial bee colony and artificial rabbits optimization for solving economic dispatch problem
Published 2023Get full text
Get full text
Get full text
Conference or Workshop Item -
4
-
5
-
6
Predicting pneumonia and region detection from X-Ray images using deep neural network
Published 2021“…The algorithm is based on the transfer learning mechanism where pretrained ResNet-50 (Convolutional Neural Network) was used followed by some custom layer for making the prediction. …”
Get full text
Get full text
Get full text
Article -
7
Features selection for IDS in encrypted traffic using genetic algorithm
Published 2013Get full text
Get full text
Get full text
Conference or Workshop Item -
8
Features selection for ids in encrypted traffic using genetic algorithm
Published 2013Get full text
Get full text
Get full text
Conference or Workshop Item -
9
Mobility management for seamless handover in carrier aggregation heterogeneous networks deployment scenario of long term evolution-advanced
Published 2018“…Therefore, the objective of the research is to propose an enhanced CADS (Het-Nets) and implement efficient adaptive handover techniques in LTE-Advanced system. …”
Get full text
Get full text
Thesis -
10
REAL AND SIMULATED MASKED FACE RECOGNITION WITH A PRE-TRAINED MODEL
Published 2023“…To increase the amount of data available for modelling, some studies have implemented mask simulation in facial photos. …”
Get full text
Get full text
Get full text
Article -
11
Lettuce Leaf Disease Detection Using Convolutional Neural Network Algorithm
Published 2023“…The detection algorithm will be develop based on a modified AlexNet model. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
12
Real and simulated masked face recognition with a pre-trained model
Published 2023“…To increase the amount of data available for modelling, some studies have implemented mask simulation in facial photos. …”
Get full text
Get full text
Get full text
Article -
13
Digital Quran With Storage Optimization Through Duplication Handling And Compressed Sparse Matrix Method
Published 2024thesis::doctoral thesis -
14
Development of a real-time clutch transition strategy for a parallel hybrid electric vehicle
Published 2011Get full text
Get full text
Get full text
Citation Index Journal -
15
-
16
MRFGRO: a hybrid meta-heuristic feature selection method for screening COVID-19 using deep features
Published 2021“…In the first stage, we have fine-tuned the parameters of the pre-trained convolutional neural networks (CNNs) to extract some features from the COVID-19 affected lungs. As pre-trained CNNs, we have used two standard CNNs namely, GoogleNet and ResNet18. …”
Get full text
Get full text
Article -
17
A comprehensive analysis of surface electromyography for control of lower limb exoskeleton
Published 2016“…For both experiment protocols, the R2 between the net and the predicted joint moment showed good agreement in the chair-rise protocol (0.99), while the in the walking task the R2 was (0.91). …”
Get full text
Get full text
Thesis -
18
Cloud-based lightweight detection of hardhat compliance based on YOLOv5 in power construction site
Published 2025“…Therefore, it is necessary to provide real-time warnings when detecting workers without hardhats. Implementing deep learning-based object detection algorithms can facilitate the enforcement of hardhat-wearing compliance, thereby reducing work-related injuries and fatalities. …”
Get full text
Get full text
Thesis -
19
An e-voting application using cryptography technology
Published 2020“…Hashing function mainly encrypts the user's confidential information to prevent theft by other users and the encrypt method can be implement from Visual Studio which is SHA-256 (Secure Hash Algorithm- 256 bits), a cryptographic hash function designed by US NSA (United States National Security Agency). …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis
