Search Results - (( rendering classification system algorithm ) OR ( java application matching algorithm ))
Search alternatives:
- rendering classification »
- classification system »
- application matching »
- system algorithm »
- java application »
-
1
-
2
A De-noising Scheme for Wavelet Based Power Quality Disturbances Detection and Classification system
Published 2011“…To overcome this difficulty and to improve the performance of the system, this paper proposes a suitable de-noising scheme to be integrated into the system so that the classification system is still workable in a noisy environment. …”
Get full text
Article -
3
A De-noising Scheme for Enhancing Power Quality Problem Classification System Based on Wavelet Transform and Rule-Based Method
Published 2011“…To overcome this difficulty and to improve the performance of the system, this paper proposes a suitable de-noising scheme to be integrated into the system so that the classification system is still workable in a noisy environment. …”
Get full text
Conference or Workshop Item -
4
POWER QUALITY CLASSIFICATION WITH DE-NOISING SCHEME USING WAVELET TRANSFORM AND RULE- BASED METHOD
Published 2012“…The performance of the classification system would be greatly degraded. To overcome this difficulty and to improve the performance of the system, a de-noising scheme is proposed to be used together with the system. …”
Get full text
Get full text
Thesis -
5
Detecting Malware with Classification Machine Learning Techniques
Published 2023“…The following research report focuses on the implementation of classification machine learning methods for detecting malware. …”
Get full text
Get full text
Get full text
Article -
6
Detecting Malware with Classification Machine Learning Techniques
Published 2023“…The following research report focuses on the implementation of classification machine learning methods for detecting malware. …”
Get full text
Get full text
Article -
7
-
8
-
9
-
10
Message based random variable length key encryption algorithm.
Published 2009Get full text
Get full text
Article -
11
Securing cloud data system (SCDS) for key exposure using AES algorithm
Published 2021“…The AES algorithm has its own structure to encrypt and decrypt sensitive data that make the attackers difficult to get the real data when encrypting by AES algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
12
-
13
An Agent-Based System with Personalization and Intelligent Assistance Services for Facilitating Knowledge Sharing
Published 2006“…The main algorithms used are profile determination and user similarity. …”
Get full text
Get full text
Thesis
