Search Results - (( java location based algorithm ) OR ( based classification drops algorithm ))
Search alternatives:
- based classification »
- classification drops »
- java »
-
1
Fair bandwidth distribution marking and scheduling algorithm in network traffic classification
Published 2019“…Second, propose an Optimized Time Sliding Window based Three Colour Marker. Finally, propose a new method of obtaining optimal parameters dropping functions for Random Early Detection (RED) algorithm. …”
Get full text
Get full text
Thesis -
2
Network Traffic Classification Analysis on Differentiated Services Code Point Using Deep Learning Models for Efficient Deep Packet Inspection
Published 2024“…Most of the algorithms got promising results and classify packets based on DSCP accurately. …”
Get full text
Get full text
Get full text
Article -
3
Development of predictive modeling and deep learning classification of taxi trip tolls
Published 2022“…Commercial navigation includes a wealth of trip-related data, including distance, expected journey time, and tolls that may be encountered along the way. Using a classification algorithm, it is possible to extract drop-off and pickup locations from taxi trip data and estimate if the tour would incur tolls. …”
Get full text
Get full text
Get full text
Article -
4
-
5
An Improve k-NN Classifier using Similarity Distance Plot-Data Reduction and Dask for Big Datasets
Published 2025“…The k-Nearest Neighbour (k-NN) algorithm is one of the most widely used Instance-Based Learning methods due to its simplicity and ease of implementation. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis -
6
DEVELOPMENT OF PREDICTIVE MODELING AND DEEP LEARNING CLASSIFICATION OF TAXI TRIP TOLLS
Published 2023“…Commercial navigation includes a wealth of trip-related data, including distance, expected journey time, and tolls that may be encountered along the way. Using a classification algorithm, it is possible to extract drop-off and pickup locations from taxi trip data and estimate if the tour would incur tolls. …”
Article -
7
Group formation using genetic algorithm
Published 2009“…However, due to lack of programming skills especially in Java programming language and the inability to have meetings frequently among the group members,most of the students’ software project cannot be delivered successfully.To solve this problem, systematic group formation is one of the initial factors that should be considered to ensure that every group consists of quality individuals who are good in Java programming and also to ensure that every group member in a group are staying closer to each other.In this research, we propose a method for group formation using Genetic Algorithms, where the members for each group will be generated based on the students’ programming skill and location of residential colleges.…”
Get full text
Get full text
Get full text
Get full text
Monograph -
8
Multi-floor indoor location estimation system based on wireless local area network
Published 2007“…The most probable match is selected and returned as estimated location based on Bayesian filtering algorithm. Estimated location is reported as physical location and symbolic location. …”
Get full text
Get full text
Thesis -
9
-
10
-
11
Electronic Tongue: Study on the Freshness of Milk
Published 2012“…After the experiment has been done, the data obtained was used in Matlab for classification purpose. By using the Neural Network algorithm, we are actually able to find the threshold line which actually separates the fresh and spoilt milk into two different regions. …”
Get full text
Get full text
Final Year Project -
12
A comparative study and simulation of object tracking algorithms
Published 2020“…This article introduces the popular object tracking algorithms, from common problems in object tracking to the classification of algorithms: Early classic trackingalgorithms, tracking algorithms based on kernel correlation filtering, and tracking algorithms based on deep learning. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
13
An efficient anomaly intrusion detection method with evolutionary neural network
Published 2020“…The second anomaly detection method is the Evolutionary Kernel Neural Network Random Weights (EKNNRW) in order to increase the accuracy of classification. The third proposed method is a new Evolutionary Neural Network (ENN) algorithm with a combination of Genetic Algorithm and Multiverse Optimizer (GAMVO) as a training part of ANN to create efficient anomaly-based detection with low false alarm rate. …”
Get full text
Get full text
Thesis -
14
Comparison of algorithm Support Vector Machine and C4.5 for identification of pests and diseases in chili plants
Published 2019“…In this study comparing the performance classification techniques of Support Vector Machine (SVM) and C4.5 algorithms. …”
Get full text
Get full text
Conference or Workshop Item -
15
Mathematical simulation for 3-dimensional temperature visualization on open source-based grid computing platform
Published 2009“…The development of this architecture is based on several programming language as it involves algorithm implementation on C, parallelization using Parallel Virtual Machine (PVM) and Java for web services development. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
16
Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption
Published 2022“…Subsequently, this project embedded with a lightweight Geo-Encryption algorithm to preserve the privacy of real-time GPS location. …”
Get full text
Get full text
Get full text
Academic Exercise -
17
Development of a lower-extremities exoskeleton for postural-sway in sit-to-stand movement
Published 2025“…The system integrates an ESP32 microcontroller, IMU-based sway detection, and a threshold-based control algorithm for real time actuation. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
18
Friendship Degree and Tenth Man Strategy: A new method for differentiating between erroneous readings and true events in wireless sensor networks
Published 2023“…The second stage will validate the voting process through a novel perspective based on the TMS. TMS will check the voters’ replies based on the event’s location. …”
Get full text
Get full text
Article -
19
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis -
20
Computer-assisted pterygium screening system: a review
Published 2022“…Hence, it is important to develop an automated pterygium screening system based on simple imaging modalities such as a mobile phone camera so that it can be assessed by many people. …”
Get full text
Get full text
Article
