Search Results - (( network segmentation mining algorithm ) OR ( java data compression algorithm ))

  • Showing 1 - 9 results of 9
Refine Results
  1. 1
  2. 2

    Analysis Of Failure In Offline English Alphabet Recognition With Data Mining Approach by Munnian, Ruthrakumar

    Published 2019
    “…Earlier studies in the handwriting recognition field were mostly focused on recognizing characters using Neural Network Language Model (NNLM) classifier, Hidden Markov Model (HMM), and Support Vector Machine (SVM) with segmentation technique, Hough Transform method, and structural features. …”
    Get full text
    Get full text
    Monograph
  3. 3

    A detailed description on unsupervised heterogeneous anomaly based intrusion detection framework by Udzir, Nur Izura, Hajamydeen, Asif Iqbal

    Published 2019
    “…More effort has been taken in utilizing the data mining and machine learning algorithms to construct anomaly based intrusion detection systems, but the dependency on the learned models that were built based on earlier network behaviour still exists, which restricts those methods in detecting new or unknown intrusions. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework by Asaad Aref, Ibrahim

    Published 2004
    “…A design proposal was outlined to provide an adaptive client/server approach to stream audio contents using Real-Time Transport Protocol (RTP) involving architecture based on the Java Media Framework (JMF) Application Programmable Interfaces (API).RTP protocol is the Internet-standard protocol for the transport of real-time data, including audio and video and can be implemented by using Java Media Framework (JMF). …”
    Get full text
    Get full text
    Thesis
  5. 5

    Improvement on rooftop classification of worldview-3 imagery using object-based image analysis by Norman, Masayu

    Published 2019
    “…The accuracy of each algorithm was evaluated using LibSVM, Bayes network, and Adaboost classifier. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Data Hiding Techniques In Digital Images by Al Thloothi, Salah Ramadan

    Published 2003
    “…After all these studies, one of the algorithms in the masking technique is developed and implemented using JAVA program to embed message into true color image with a good quality and higher capacity. …”
    Get full text
    Get full text
    Thesis
  7. 7

    SecPath: Energy efficient path reconstruction in wireless sensor network using iterative smoothing by Abd, Wamidh Jwdat

    Published 2019
    “…To achieve energy efficiency, it compresses the packet information by using GZIP tools in JAVA. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Energy efficient path reconstruction in wireless sensor network using iPath by Hasan, Sazlinah, Abd, Wamidh Jwdat, Ariffin, Ahmad Alauddin

    Published 2019
    “…To achieve energy efficiency, it compresses the packet information by using GZIP tools in JAVA. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Validation of deep convolutional neural network for age estimation in children using mandibular premolars on digital panoramic dental imaging / Norhasmira Mohammad by Mohammad, Norhasmira

    Published 2022
    “…The semi-automated dental staging system developed in this study is based on the Malay children’s population and uses a brain-inspired learning algorithm termed "deep learning". The methodology is comprised of four major steps: image preprocessing, which adheres to the inclusion criteria for panoramic dental radiographs, segmentation, and classification of mandibular premolars according to Demirjian's staging system using the Dynamic Programming-Active Contour (DP-AC) method and Deep Convolutional Neural Network (DCNN), respectively, and statistical analysis. …”
    Get full text
    Get full text
    Thesis