Search Results - (( program binary classification algorithm ) OR ( java application service algorithm ))
Search alternatives:
- binary classification »
- application service »
- service algorithm »
- java application »
- program binary »
-
1
-
2
Analysis Of Personal Protective Equipment Classification Method Using Deep Learning
Published 2022“…Based on the result, CNN algorithm is a good algorithm as the binary classification of PPE achieved high accuracy result.…”
Get full text
Get full text
Undergraduates Project Papers -
3
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
4
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
5
Comparison of Recursive Feature Elimination and Boruta as Feature Selection in Greenhouse Gas Emission Data Classification
Published 2024“…The Support Vector Machine (SVM) algorithm is employed to evaluate classification performance, focusing on binary classification into "high" and "low" categories in this study. …”
Get full text
Get full text
Get full text
Article -
6
Simulation on Emotion Recognition for Autism Therapy
Published 2017“…This paper mainly focusing on the simulation of emotion recognition software based on the Local Binary Pattern (LBP) algorithm to extract the features from the image. …”
Get full text
Get full text
Final Year Project -
7
-
8
Raspberry Pi-Based Finger Vein Recognition System Using PCANet
Published 2018“…Factors which impact PCANet are studied to identify the limitations of PCANet. For classification, k-Nearest Neighbours (kNN) with Euclidean distance algorithm is implemented. …”
Get full text
Get full text
Monograph -
9
Derivations of some classes of Leibniz algebras
Published 2013“…Starting from dimensions four and above there are classifications of subclasses (in dimension four nilpotent case and in dimensions (5-8) there are classifications of filiform Leibniz algebras). …”
Get full text
Get full text
Thesis -
10
Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework
Published 2004“…A design proposal was outlined to provide an adaptive client/server approach to stream audio contents using Real-Time Transport Protocol (RTP) involving architecture based on the Java Media Framework (JMF) Application Programmable Interfaces (API).RTP protocol is the Internet-standard protocol for the transport of real-time data, including audio and video and can be implemented by using Java Media Framework (JMF). …”
Get full text
Get full text
Thesis -
11
Feature clustering for pso-based feature construction on high-dimensional data
Published 2019“…The clustering of each features are proven to be accurate in feature selection (FS), however, only one study investigated its application in FC for classification. The study identified some limitations, such as the implementation of only two binary classes and the decreasing accuracy of the data. …”
Get full text
Get full text
Get full text
Article -
12
Mathematical simulation for 3-dimensional temperature visualization on open source-based grid computing platform
Published 2009“…The development of this architecture is based on several programming language as it involves algorithm implementation on C, parallelization using Parallel Virtual Machine (PVM) and Java for web services development. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
13
Talkout : Protecting mental health application with a lightweight message encryption
Published 2022“…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
Get full text
Get full text
Get full text
Academic Exercise -
14
An optimal under frequency load shedding scheme for islanded distribution network / Amalina Izzati Md Isa
Published 2018“…Inclusive with the design of UFLS is a new module referred as Load Shedding Module (LSM). Two new algorithms i.e., Load Classification based Fuzzy Logic (LCFL) and Binary Evolutionary Programming (BEP) are introduced in the module. …”
Get full text
Get full text
Thesis -
15
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…A GUI is created in a form of JAVA application to display data detected from tag. …”
Get full text
Get full text
Thesis -
16
-
17
Implementation of RIO in UMJaNetSim / Chan Chin We
Published 2004Get full text
Get full text
Thesis -
18
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis -
19
An Agent-Based System with Personalization and Intelligent Assistance Services for Facilitating Knowledge Sharing
Published 2006“…KSFaci is embedded in web environment and is implemented using Java Servlet and runs under Apache server. The performance of KSFaci is evaluated using a four-factor evaluation metrics covering the user profile preciseness, recommendation service, staff directory and document repository. …”
Get full text
Get full text
Thesis -
20
An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications
Published 2015“…This research work was limited to Java based web applications. In future research, the method can be extended to include other programming languages as well as other similar web application security vulnerabilities.…”
Get full text
Get full text
Thesis
