Search Results - (( based constructing a algorithm ) OR ( data solution learning algorithm ))
Search alternatives:
- based constructing »
- learning algorithm »
- solution learning »
- constructing a »
- data solution »
- a algorithm »
-
1
Parameter Estimation of Lorenz Attractor: A Combined Deep Neural Network and K-Means Clustering Approach
Published 2022“…This study constructs the flow of DNN based method with the K-Means algorithm. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
2
A robust firefly algorithm with backpropagation neural networks for solving hydrogeneration prediction
Published 2018“…The objective of this study, first, a firefly algorithm (FA) based on the k-fold cross-validation of BPNN has been suggested to predict data for keeping rapid learning and prevents the exponential increase in operating parts. …”
Get full text
Get full text
Get full text
Get full text
Article -
3
Sentiment analysis for malay newspaper (SAMNews) using negative selection algorithm / Nur Amalina Redzuan
Published 2013“…In future, a comparative study on Artificial Immune System and other techniques or algorithms can be carried out to enhance the performance of the classification model.…”
Get full text
Get full text
Thesis -
4
Theory-guided machine learning for predicting and minimising surface settlement caused by the excavation of twin tunnels / Chia Yu Huat
Published 2024“…This is due to the data generated from the numerical model possess the pattern for the ML algorithm ease of prediction. …”
Get full text
Get full text
Get full text
Thesis -
5
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…A novel security component named â��intelligent security engineâ�� is introduced which learns the possible occurrences of security threats on SOA using artificial neural networks learning algorithms, then it predicts the potential attacks on SOA based on obtained results by the developed theoretical security model, and the written algorithms as part of security solution prevent the SOA attacks. …”
Get full text
Get full text
Article -
6
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…A novel security component named â��intelligent security engineâ�� is introduced which learns the possible occurrences of security threats on SOA using artificial neural networks learning algorithms, then it predicts the potential attacks on SOA based on obtained results by the developed theoretical security model, and the written algorithms as part of security solution prevent the SOA attacks. …”
Get full text
Get full text
Article -
7
Gravitational Search Algorithm based Long Short-term Memory Deep Neural Network for Battery Capacity and Remaining Useful Life Prediction with Uncertainty
Published 2024“…The GSA algorithm optimizes the hyperparameters of the LSTM network to construct an optimal model. …”
Conference Paper -
8
An ensemble of neural network and modified grey wolf optimizer for stock prediction
Published 2019“…The research implements stock prediction analysis as a case study for training the neural network by adopting MGWO algorithm. …”
Get full text
Get full text
Thesis -
9
A systematic review of machine learning techniques and applications in soil improvement using green materials
Published 2023“…The current study aims to comprehensively evaluate recent breakthroughs in machine learning algorithms for soil improvement using a systematic procedure known as PRISMA and meta-analysis. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
10
Deep continual learning for predicting blast-induced overbreak in tunnel construction / He Biao
Published 2024“…This thesis addresses the limitations of existing overbreak prediction methods by introducing a novel data-driven approach based on deep continual learning. …”
Get full text
Get full text
Get full text
Thesis -
11
Optimization of multi-agent traffic network system with Q-Learning-Tune fitness function
Published 2019“…The interactive metamodel is extracted using Q-Learning (QL) via online observing and learning of the outflow-inflow traffic characteristics. …”
Get full text
Get full text
Get full text
Thesis -
12
-
13
-
14
EEG-Based Person Authentication Modelling Using Incremental Fuzzy-Rough Nearest Neighbour Technique
Published 2016“…The IncFRNN technique was evaluated using a collected EEG data from 37 subjects. The recorded datasets were designed in three different conditions of ambient noise influence to evaluate the performance of the proposed solution. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
15
Evaluation of machine learning algorithms in predicting CO 2 internal corrosion in oil and gas pipelines
Published 2019“…This creates a demand of utilizing machine learning in predicting corrosion occurrence. This paper discusses on the evaluation of machine learning algorithms in predicting CO 2 internal corrosion rate. …”
Get full text
Get full text
Article -
16
Evaluation of machine learning algorithms in predicting CO2 internal corrosion in oil and gas pipelines
Published 2019“…This creates a demand of utilizing machine learning in predicting corrosion occurrence. This paper discusses on the evaluation of machine learning algorithms in predicting CO2 internal corrosion rate. …”
Get full text
Get full text
Article -
17
A new variant of black hole algorithm based on multi population and levy flight for clustering problem
Published 2020“…Black Hole (BH) optimization algorithm has been underlined as a solution for data clustering problems. …”
Get full text
Get full text
Thesis -
18
An Intelligent Data-Driven Approach for Electrical Energy Load Management Using Machine Learning Algorithms
Published 2022“…This fusion of data science, artificial intelligence, and electrical energy management has turned out to be the most precise and robust energy management solution. …”
Get full text
Get full text
Get full text
Article -
19
Hyper-heuristic approaches for data stream-based iIntrusion detection in the Internet of Things
Published 2022“…On the other hand, existing stream data learning models with limited labelling have many limitations. …”
Get full text
Get full text
Thesis -
20
