Search Results - (( (structures OR structural) network mining algorithm ) OR ( java application using algorithm ))

Refine Results
  1. 1

    Data mining for structural damage identification using hybrid artificial neural network based algorithm for beam and slab girder / Meisam Gordan by Meisam , Gordan

    Published 2020
    “…After evaluating the results of these algorithms, a hybrid Artificial Neural Network-based Imperial Competitive Algorithm (ANN-ICA) was presented in the deployment step of the proposed methodology to identify the structural damage of illustrative structures. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    Data mining based damage identification using imperialist competitive algorithm and artificial neural network by Gordan, Meisam, Razak, Hashim Abdul, Ismail, Zubaidah, Ghaedi, Khaled

    Published 2018
    “…In this study, to predict the damage severity of sin-gle-point damage scenarios of I-beam structures a data mining based damage identification framework and a hybrid algorithm combining Artificial Neural Network (ANN) and Imperial Competitive Algorithm (ICA), called ICA-ANN method, is proposed. …”
    Get full text
    Get full text
    Article
  3. 3
  4. 4
  5. 5

    Hybridised Network of Fuzzy Logic and a Genetic Algorithm in Solving 3-Satisfiability Hopfield Neural Networks by Farah Liyana, Azizan, Saratha, Sathasivam, Majid Khan, Majahar Ali, Nurshazneem, Roslan, Caicai, Feng

    Published 2023
    “…This work proposed a new hybridised network of 3-Satisfiability structures that widens the search space and improves the effectiveness of the Hopfield network by utilising fuzzy logic and a metaheuristic algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    SPATIAL DATA MINING TOOLBOX FOR MAPPING SUITABILITY OF LANDFILL SITES USING NEURAL NETWORKS by Abujayyab, Sohaib K. M., S. Ahamad, Mohd Sanusi, Yahya, Ahmad Shukri, Abdul Aziz, Hamidi

    Published 2016
    “…The multilayer perceptron (MLP) neural networks structure with a backpropagation learning algorithm is used. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Multi-agent and artificial neural networks prediction framework development for stock investment strategy by Phang, Wai San

    Published 2016
    “…WMA comprises of an algorithm for web mining which enables it to mine and extract semi-structured information and create new structured information using ontology. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Multi agent and artificial neural networks prediction framework development for stock investment strategy by Phang, Wai San

    Published 2016
    “…WMA comprises of an algorithm for web mining which enables it to mine and extract semi-structured information and create new structured information using ontology. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Spatial Data Mining Model For Landfill Sites Suitability Mapping Based On Neural Networks And Multivariate Analysis by Abujayyab, Sohaib K. M.

    Published 2017
    “…The optimum structure of the proposed network was selected using 600,000 use cases. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Analysis Of Failure In Offline English Alphabet Recognition With Data Mining Approach by Munnian, Ruthrakumar

    Published 2019
    “…Earlier studies in the handwriting recognition field were mostly focused on recognizing characters using Neural Network Language Model (NNLM) classifier, Hidden Markov Model (HMM), and Support Vector Machine (SVM) with segmentation technique, Hough Transform method, and structural features. …”
    Get full text
    Get full text
    Monograph
  11. 11

    Synergizing intelligence and knowledge discovery: Hybrid black hole algorithm for optimizing discrete Hopfield neural network with negative based systematic satisfiability by Rusdi, Nur ‘Afifah, Zamri, Nur Ezlin, Kasihmuddin, Mohd Shareduwan Mohd, Romli, Nurul Atiqah, Manoharam, Gaeithry, Abdeen, Suad, Mansor, Mohd. Asyraf

    Published 2024
    “…Furthermore, the systematic logical rules neglect the impact on the appearance of negative literals within the logical structure, and most recent efforts have primarily focused on improving the learning capabilities of the network, which could potentially limit its overall efficiency. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  13. 13
  14. 14

    Implementation of Objects Recognition in Seismic Image via Artificial Neural Network (ANN) by Wan , Chin Ee

    Published 2012
    “…These sections, also known as objects made up of different patterns which portraying the structure of subsurface. This project aims to develop a data mining algorithm embedded in a system that has ability to recognize the objects of channel and fault in seismic image. …”
    Get full text
    Get full text
    Final Year Project
  15. 15
  16. 16

    Multitasking deep neural network models for Arabic dialect sentiment analysis by Alali, Muath Mohammad Oqlah

    Published 2022
    “…So far, there has been no effort to handle the negation context in Arabic using a deep neural network. The existing approaches are based on traditional machine learning algorithms, such as support vector machine (SVM). …”
    Get full text
    Get full text
    Thesis
  17. 17

    A hybrid local search algorithm for minimum dominating set problems by Abed, S.A., Rais, H.M., Watada, J., Sabar, N.R.

    Published 2022
    “…Compared to the literature, the proposed algorithm outperformed other algorithms in most of the tested instances. …”
    Get full text
    Get full text
    Article
  18. 18

    A hybrid local search algorithm for minimum dominating set problems by Abed, S.A., Rais, H.M., Watada, J., Sabar, N.R.

    Published 2022
    “…Compared to the literature, the proposed algorithm outperformed other algorithms in most of the tested instances. …”
    Get full text
    Get full text
    Article
  19. 19
  20. 20

    A detailed description on unsupervised heterogeneous anomaly based intrusion detection framework by Udzir, Nur Izura, Hajamydeen, Asif Iqbal

    Published 2019
    “…More effort has been taken in utilizing the data mining and machine learning algorithms to construct anomaly based intrusion detection systems, but the dependency on the learned models that were built based on earlier network behaviour still exists, which restricts those methods in detecting new or unknown intrusions. …”
    Get full text
    Get full text
    Get full text
    Article