Search Results - (( variable training least algorithm ) OR ( java application using algorithm ))
Search alternatives:
- variable training »
- java application »
- least algorithm »
- using algorithm »
- training least »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
-
3
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
4
Predicting dengue transmission rates by comparing different machine learning models with vector indices and meteorological data
Published 2023“…Previous work has focused only on specific weather variables and algorithms, and there is still a need for a model that uses more variables and algorithms that have higher performance. …”
Get full text
Get full text
Get full text
Get full text
Article -
5
Enhancing the entrepreneurial intention of the retiring military personnel through entrepreneurial training
Published 2017“…Partial Least Squares-Structural Equation Model (PLS-SEM) algorithm and bootstrap techniques were used to test the study hypotheses. …”
Get full text
Get full text
Get full text
Thesis -
6
A least-square-driven functional networks type-2 fuzzy logic hybrid model for efficient petroleum reservoir properties prediction
Published 2013“…This paper presents a computational intelligence hybrid model to overcome some of the limitations of the standalone type-2 fuzzy logic system (T2FLS) model by using a least-square-fitting-based model selection algorithm to reduce the dimensionality of the input data while selecting the best variables. …”
Get full text
Get full text
Get full text
Article -
7
Real-Time Video Processing Using Native Programming on Android Platform
Published 2012“…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
8
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
9
Algorithm enhancement for host-based intrusion detection system using discriminant analysis
Published 2004“…Misuse detection algorithms model know attack behavior. They compare sensor data to attack patterns learned from the training data. …”
Get full text
Get full text
Thesis -
10
A novel computer-aided multivariate water quality index
Published 2015“…A computer-aided multivariate water quality index is developed based on partial least squares (PLS) regression. The index is termed as the partial least squares water quality index (PLS-WQI). …”
Get full text
Get full text
Get full text
Article -
11
Real-time algorithmic music composition application.
Published 2022“…This project is about the study of evolutionary music, and focuses on the development of an algorithmic music composer using the Java programming language. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
12
Performance evaluation of real-time multiprocessor scheduling algorithms
Published 2016“…We hyave used the CPU profiler of Oracle JavaTM VisualVM to monitor the execution of LRE-TL as well as USG algorithms. …”
Get full text
Get full text
Conference or Workshop Item -
13
Development Of Water Quality Index Prediction Model For Penang Rivers Using Artificial Neural Network
Published 2021“…As for the implementation of MPCA in feature extraction for BOD and COD, there were only 4 inputs required to explain at least 99.999% variability for both analyses. Altogether, for BOD, the BR algorithm with 60% training and 12 hidden nodes gives R=0.7825 whereas for COD, the BR algorithm with 70% training and 10 hidden nodes gives R=0.6716. …”
Get full text
Get full text
Monograph -
14
Optimization of blood vessel detection in retina images using multithreading and native code for portable devices
Published 2013Get full text
Get full text
Conference or Workshop Item -
15
Application of genetic algorithm and JFugue in an evolutionary music generator
Published 2025“…This project explores the application of Genetic Algorithms (GA) with JFugue, which is a Java-based music programming library to develop an Evolutionary Music Generator. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
16
Optimal Weighted Learning of PCA and PLS for Multicollinearity Discriminators and Imbalanced Groups in Big Data (S/O: 13224)
“…Then, the weights are used together with either Principal Component Analysis (PCA) or Partial Least Square (PLS) to tackle the collinearity among variables. …”
Get full text
Get full text
Monograph -
17
A study on advanced statistical analysis for network anomaly detection
Published 2005“…Misuse detection algorithms model know attack behavior. They compare sensor data to attack patterns learned from the training data. …”
Get full text
Monograph -
18
-
19
Route Optimization System
Published 2005“…The method used to develop this project is Rapid Application Development (RAD). …”
Get full text
Get full text
Final Year Project -
20
Secure Image Steganography Using Encryption Algorithm
Published 2016“…Diffie-Hellman algorithm is used to determine the pixel on an image that will be used to store the message. …”
Get full text
Get full text
Conference or Workshop Item
