Search Results - (( learning classification drops algorithm ) OR ( java application using algorithm ))

Refine Results
  1. 1

    Development of predictive modeling and deep learning classification of taxi trip tolls by Al-Shoukry, Suhad, M. Jawad, Bushra Jaber, Zalili, Musa, Sabry, Ahmad H.

    Published 2022
    “…Commercial navigation includes a wealth of trip-related data, including distance, expected journey time, and tolls that may be encountered along the way. Using a classification algorithm, it is possible to extract drop-off and pickup locations from taxi trip data and estimate if the tour would incur tolls. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Network Traffic Classification Analysis on Differentiated Services Code Point Using Deep Learning Models for Efficient Deep Packet Inspection by Ahmed Khan, Fazeel, Abubakar, Adamu

    Published 2024
    “…The data was gathered using real-time packet capturing tools which were then processed and moved with model development using different deep learning algorithms such as, LSTM, MLP, RNN and Autoencoders. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    DEVELOPMENT OF PREDICTIVE MODELING AND DEEP LEARNING CLASSIFICATION OF TAXI TRIP TOLLS by Al-Shoukry S., Jawad B.J.M., Musa Z., Sabry A.H.

    Published 2023
    “…Commercial navigation includes a wealth of trip-related data, including distance, expected journey time, and tolls that may be encountered along the way. Using a classification algorithm, it is possible to extract drop-off and pickup locations from taxi trip data and estimate if the tour would incur tolls. …”
    Article
  4. 4

    Blood cell classification using deep learning by Liaw, Mun Kin

    Published 2022
    “…The advancement of Artificial Intelligence (AI) has introduced complex methods such as deep learning that would automate the classification of blood cells in a fast and accurate manner Thus, the study of White Blood Cells (WBCs) classification using deep learning techniques is proposed in this research. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  5. 5

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  6. 6
  7. 7
  8. 8

    A comparative study and simulation of object tracking algorithms by Ji, Yuanfa, Yin, Pan, Sun, Xiyan, Kamarul Hawari, Ghazali, Guo, Ning

    Published 2020
    “…This article introduces the popular object tracking algorithms, from common problems in object tracking to the classification of algorithms: Early classic trackingalgorithms, tracking algorithms based on kernel correlation filtering, and tracking algorithms based on deep learning. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    Automated traffic counting data collection and analysis by Low, Anand Hong Ren

    Published 2021
    “…The performance of the algorithm is determined by the counting, classification, and speed measuring accuracy. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  10. 10

    Real-Time Video Processing Using Native Programming on Android Platform by Saipullah, Khairul Muzzammil

    Published 2012
    “…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11
  12. 12

    Real-time algorithmic music composition application. by Yap, Alisa Yi Hui

    Published 2022
    “…This project is about the study of evolutionary music, and focuses on the development of an algorithmic music composer using the Java programming language. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  13. 13

    Performance evaluation of real-time multiprocessor scheduling algorithms by Alhussian, H., Zakaria, N., Abdulkadir, S.J., Fageeri, S.O.

    Published 2016
    “…We hyave used the CPU profiler of Oracle JavaTM VisualVM to monitor the execution of LRE-TL as well as USG algorithms. …”
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14
  15. 15

    Application of genetic algorithm and JFugue in an evolutionary music generator by Tang, Jia Rou

    Published 2025
    “…This project explores the application of Genetic Algorithms (GA) with JFugue, which is a Java-based music programming library to develop an Evolutionary Music Generator. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  16. 16

    An efficient anomaly intrusion detection method with evolutionary neural network by Sarvari, Samira

    Published 2020
    “…Although activation functions are important for MLP to learn but for nonlinear complex functional mappings it has complicated calculation which reduces the accuracy of classification. …”
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18

    Route Optimization System by Zulkifli, Abdul Hayy

    Published 2005
    “…The method used to develop this project is Rapid Application Development (RAD). …”
    Get full text
    Get full text
    Final Year Project
  19. 19

    Computer-assisted pterygium screening system: a review by Abdani, Siti Raihanah, Zulkifley, Mohd Asyraf, Shahrimin, Mohamad Ibrani, Zulkifley, Nuraisyah Hani

    Published 2022
    “…During the early stage of automated pterygium screening system development, conventional machine learning techniques such as support vector machines and artificial neural networks are the de facto algorithms to detect the presence of pterygium tissues. …”
    Get full text
    Get full text
    Article
  20. 20

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…Diffie-Hellman algorithm is used to determine the pixel on an image that will be used to store the message. …”
    Get full text
    Get full text
    Conference or Workshop Item