Search Results - (( using modification learning algorithm ) OR ( java application service algorithm ))
Search alternatives:
- modification learning »
- application service »
- using modification »
- learning algorithm »
- service algorithm »
- java application »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
2
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
3
A hybrid residue based sequential encoding mechanism with XGBoost improved ensemble model for identifying 5-hydroxymethylcytosine modifications
Published 2025“…Among the applied machine learning algorithms, the XGBoost ensemble model using the tenfold cross-validation test achieved improved results than existing state-of-the-art models. …”
Article -
4
Accelerating learning performance of back propagation algorithm by using adaptive gain together with adaptive momentum and adaptive learning rate on classification problems
Published 2011“…Over the years, many improvements and modifications of the back propagation learning algorithm have been reported. …”
Get full text
Get full text
Get full text
Article -
5
Different mutation and crossover set of genetic programming in an automated machine learning
Published 2020“…Automated machine learning is a promising approach widely used to solve classification and prediction problems, which currently receives much attention for modification and improvement. …”
Get full text
Get full text
Article -
6
Different mutation and crossover set of genetic programming in an automated machine learning
Published 2020“…Automated machine learning is a promising approach widely used to solve classification and prediction problems, which currently receives much attention for modification and improvement. …”
Get full text
Get full text
Article -
7
Optimization Of Two-Dimensional Dual Beam Scanning System Using Genetic Algorithms
Published 2008“…Also, this research involves in developing a machine-learning system and program via genetic algorithm that is capable of performing independent learning capability and optimization for scanning sequence using novel GA operators. …”
Get full text
Get full text
Thesis -
8
Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework
Published 2004“…A design proposal was outlined to provide an adaptive client/server approach to stream audio contents using Real-Time Transport Protocol (RTP) involving architecture based on the Java Media Framework (JMF) Application Programmable Interfaces (API).RTP protocol is the Internet-standard protocol for the transport of real-time data, including audio and video and can be implemented by using Java Media Framework (JMF). …”
Get full text
Get full text
Thesis -
9
Learning to filter text in forum message
Published 2005“…In this paper, the modification of the algorithm including pre-processing and classification will be discussed in the attempt to apply learning to filter forum messages.…”
Get full text
Get full text
Conference or Workshop Item -
10
-
11
Three-term backpropagation algorithm for classification problem
Published 2006“…Standard Backpropagation Algorithm (BP) is a widely used algorithm in training Neural Network that is proven to be very successful in many diverse application. …”
Get full text
Get full text
Thesis -
12
A new variant of black hole algorithm based on multi population and levy flight for clustering problem
Published 2020“…Furthermore, the results revealed a high convergence rate, upon which the algorithm’s performance was subjected to data clustering problems and investigated using six real datasets. …”
Get full text
Get full text
Thesis -
13
Edge assisted crime prediction and evaluation framework for machine learning algorithms
Published 2022“…To anticipate occurrences, ML methods such as Decision Trees, Neural Networks, K-Nearest Neighbors, and Impact Learning are being utilized, and their performance is compared based on the data processing and modification used. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
14
Mathematical simulation for 3-dimensional temperature visualization on open source-based grid computing platform
Published 2009“…The development of this architecture is based on several programming language as it involves algorithm implementation on C, parallelization using Parallel Virtual Machine (PVM) and Java for web services development. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
15
An approach to improve functional link neural network training using modified artificial bee colony for classification task
Published 2013“…To overcome this, a Functional Link Neural Networks (FLNN), which has single layer of trainable connection weight is used. The standard method for tuning the weight in FLNN is using a Backpropagation (BP) learning algorithm. …”
Get full text
Get full text
Get full text
Article -
16
An approach to improve functional link neural network training using modified artificial bee colony for classification task
Published 2012“…To overcome this, a Functional Link Neural Networks (FLNN), which has single layer of trainable connection weight is used. The standard method for tuning the weight in FLNN is using a Backpropagation (BP) learning algorithm. …”
Get full text
Get full text
Article -
17
An approach to improve functional link neural network training using modified artificial bee colony for classification task
Published 2012“…To overcome this, a Functional Link Neural Networks (FLNN), which has single layer of trainable connection weight is used. The standard method for tuning the weight in FLNN is using a Backpropagation (BP) learning algorithm. …”
Get full text
Get full text
Article -
18
Talkout : Protecting mental health application with a lightweight message encryption
Published 2022“…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
Get full text
Get full text
Get full text
Academic Exercise -
19
Grammar-based prosody modification for explicit control Malay language storytelling speech synthesis / Muhammad Izzad Ramli
Published 2018“…Using Harmonic Noise Model (HNM) as the synthesizer, the grammar-based prosody modification rules are used to produce the synthesized storytelling speech. …”
Get full text
Get full text
Thesis -
20
Identification of continuous-time model of hammerstein system using modified multi-verse optimizer
Published 2021“…By considering these limitations, two modifications were made upon the conventional MVO in our proposed mMVO algorithm. …”
Get full text
Get full text
Thesis
