Search Results - (( java information using algorithm ) OR ( using function learning algorithm ))
Search alternatives:
- learning algorithm »
- information using »
- function learning »
- java information »
- using algorithm »
- using function »
-
1
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
2
RSA Encryption & Decryption using JAVA
Published 2006Get full text
Get full text
Final Year Project -
3
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
4
Anfis Modelling On Diabetic Ketoacidosis For Unrestricted Food Intake Conditions
Published 2017“…In conclusion, diabetic ketoacidosis in unrestricted food intake conditions can be predicted using the proposed ANFIS and GA-ANFIS model. Future work should be focusing on data collection of the E-Nose sensors and the improvement of the learning algorithm robustness towards environmental noise during data acquisition, such as evaporation and contamination of odor samples.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
5
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis outlines the two different implementation techniques of the existing FLEX algorithm using java based parsers and using a query language for XML. …”
Get full text
Get full text
Thesis -
6
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…These data are processed and stored in appropriate formats in a MySQL server database. Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
Get full text
Get full text
Get full text
Article -
7
Secure Image Steganography Using Encryption Algorithm
Published 2016Get full text
Get full text
Conference or Workshop Item -
8
A Reference Based Surface Defect Segmentation Algorithm For Automatic Optical Inspection System
Published 2020“…However, present complex algorithms which are accurate require high processing power using a large size of learning dataset without labelling error. …”
Get full text
Get full text
Thesis -
9
-
10
Training functional link neural network with ant lion optimizer
Published 2020“…Functional Link Neural Network (FLNN) has becoming as an important tool used in machine learning due to its modest architecture. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
11
Functional link neural network with modified bee-firefly learning algorithm for classification task
Published 2016“…The single layer property of FLNN also make the learning algorithm used less complicated compared to MLP network. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
12
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
Get full text
Get full text
Conference or Workshop Item -
13
A modified generalized RBF model with EM-based learning algorithm for medical applications
Published 2006“…Radial Basis Function (RBF) has been widely used in different fields, due to its fast learning and interpretability of its solution. …”
Get full text
Get full text
Get full text
Proceeding Paper -
14
An improved artificial bee colony algorithm for training multilayer perceptron in time series prediction
Published 2014“…Furthermore, here these algorithms used to train the MLP on two tasks; the seismic event's prediction and Boolean function classification. …”
Get full text
Get full text
Get full text
Thesis -
15
Hybrid cryptography algorithm to improve security cloud storage
Published 2017“…Utilization of a solitary algorithm is not powerful for extra ordinary state security to information in cloud computing. …”
Get full text
Get full text
Get full text
Thesis -
16
Security Analysis Between Static And Dynamic S-boxes In Block Ciphers
Published 2024Get full text
Article -
17
Binary Coati Optimization Algorithm- Multi- Kernel Least Square Support Vector Machine-Extreme Learning Machine Model (BCOA-MKLSSVM-ELM): A New Hybrid Machine Learning Model for Pr...
Published 2024“…For water level prediction, lagged rainfall and water level are used. In this study, we used extreme learning machine (ELM)-multi-kernel least square support vector machine (ELM-MKLSSVM), extreme learning machine (ELM)-LSSVM-polynomial kernel function (PKF) (ELM-LSSVM-PKF), ELM-LSSVM-radial basis kernel function (RBF) (ELM-LSSVM-RBF), ELM-LSSVM-Linear Kernel function (LKF), ELM, and MKLSSVM models to predict water level. …”
Article -
18
Differential evolution for neural networks learning enhancement
Published 2008“…These algorithms can be used successfully in many applications requiring the optimization of a certain multi-dimensional function. …”
Get full text
Get full text
Get full text
Thesis -
19
Text messaging encryption system
Published 2012“…The programming language that is used to write the program is Java Language.…”
Get full text
Get full text
Undergraduates Project Papers -
20
Dynamic training rate for backpropagation learning algorithm
Published 2013“…In this paper, we created a dynamic function training rate for the Back propagation learning algorithm to avoid the local minimum and to speed up training.The Back propagation with dynamic training rate (BPDR) algorithm uses the sigmoid function.The 2-dimensional XOR problem and iris data were used as benchmarks to test the effects of the dynamic training rate formulated in this paper.The results of these experiments demonstrate that the BPDR algorithm is advantageous with regards to both generalization performance and training speed. …”
Get full text
Get full text
Get full text
Conference or Workshop Item
