Search Results - (( pattern orientation learning algorithm ) OR ( java application testing algorithm ))
Search alternatives:
- orientation learning »
- pattern orientation »
- application testing »
- learning algorithm »
- testing algorithm »
- java application »
-
1
Using GA and KMP algorithm to implement an approach to learning through intelligent framework documentation
Published 2023Subjects:Conference paper -
2
Implementing case-based reasoning approach to framework documentation
Published 2023“…During the "revise" and "retain" steps of the CBR, Knuth-Morris-Pratt (KMP) pattern matching algorithm is applied. � 2008 IEEE.…”
Conference paper -
3
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
4
Analysis of banana plant health using machine learning techniques
Published 2024“…Automated systems that integrate machine learning and deep learning algorithms have proven to be effective in predicting diseases. …”
Get full text
Get full text
Get full text
Article -
5
Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application
Published 2020“…Performance Testing is used to test the performance of algorithm implementations in applications. …”
Get full text
Get full text
Journal -
6
-
7
Investigating optimal smartphone placement for identifying stairs movement using machine learning
Published 2023“…The inertial sensor data was collected from the smartphone at two different positions and two different orientations. The data was trained against 6 machine learning algorithms namely Decision Tree, Logistic Regression, Naive Bayes, Random Forest, Neural Networks and KNN. …”
Get full text
Get full text
Get full text
Get full text
Article -
8
Multi-sensor fusion and deep learning framework for automatic human activity detection and health monitoring using motion sensor data / Henry Friday Nweke
Published 2019“…In the second method utilizing deep learning and orientation invariant features for human activity detection. …”
Get full text
Get full text
Get full text
Thesis -
9
Adaptive Non-Stationary Cardiac Signals Identification using an Augmented MLP Network
Published 2007“…It will be also an ideal case when dealing with ECG signals where the pattern of signals varies as it depends on the condition of patience at very short frame of time.In this paper the recursive learning algorithms is being tested on an Augmented a Multilayer- Perceptron (MLP) or also known as Direct-Link MLP (DMLP) networks. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
10
-
11
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…The concept of ABS algorithm was firstly studied, including the definition, historical background, and a brief comparison was made between the ABS algorithm with other types of algorithm. …”
Get full text
Get full text
Undergraduates Project Papers -
12
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…The proposed security architecture is constructed as an adaptive way-forward Internet-of-Things (IoT) friendly security solution that is comprised of three cyclic parts: learn, predict and prevent. A novel security component named â��intelligent security engineâ�� is introduced which learns the possible occurrences of security threats on SOA using artificial neural networks learning algorithms, then it predicts the potential attacks on SOA based on obtained results by the developed theoretical security model, and the written algorithms as part of security solution prevent the SOA attacks. …”
Get full text
Get full text
Article -
13
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…The proposed security architecture is constructed as an adaptive way-forward Internet-of-Things (IoT) friendly security solution that is comprised of three cyclic parts: learn, predict and prevent. A novel security component named â��intelligent security engineâ�� is introduced which learns the possible occurrences of security threats on SOA using artificial neural networks learning algorithms, then it predicts the potential attacks on SOA based on obtained results by the developed theoretical security model, and the written algorithms as part of security solution prevent the SOA attacks. …”
Get full text
Get full text
Article -
14
Classification System for Heart Disease Using Bayesian Classifier
Published 2007“…This system was developing base on to three main part which is data processing, testing and implementation of the algorithm. In this system a Bayesian algorithm was used in order to implement the system. …”
Get full text
Get full text
Thesis -
15
-
16
-
17
Encrypted mobile messaging application using AES block cipher cryptography algorithm / Nur Rasyiqah Zulkifli
Published 2019“…The programming language that is used to write the program is Java Language that will run on android phones. As the result, this project was tested on the functionality of the mobile messaging application. …”
Get full text
Get full text
Student Project -
18
Design Of Robot Motion Planning Algorithm For Wall Following Robot
Published 2006Get full text
Get full text
Monograph -
19
Security Analysis Between Static And Dynamic S-boxes In Block Ciphers
Published 2024Get full text
Article -
20
