Search Results - (( changes identification learning algorithm ) OR ( java application customization algorithm ))

Refine Results
  1. 1

    Automated transtibial prosthesis alignment: A systematic review by Khamis T., Khamis A.A., Al Kouzbary M., Al Kouzbary H., Mokayed H., Razak N.A.A., Osman N.A.A.

    Published 2025
    “…The selected studies represent cutting-edge research, employing diverse approaches such as advanced machine learning algorithms and innovative alignment tools, to automate the detection and adjustment of prosthesis alignment. …”
    Review
  2. 2

    Plant identification using combination of fuzzy c-means spatial pyramid matching, gist, multi-texton histogram and multiview dictionary learning by Safa, Soodabeh

    Published 2016
    “…Furthermore, feature extraction methods based on global features such as shape, color and texture do not lead to accurate identification since they cannot adapt to changing environment. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Privacy optimization and intrusion detection in modbus/tcp network-based scada in water distribution systems by Franco, Daniel Jose Da Graca Peceguina

    Published 2021
    “…Another problematic aspect is related to the intrusion detection solutions that are based on machine learning cluster algorithms to learn systems’ specifications and extract general state-based rules for attacks identification. …”
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5
  6. 6
  7. 7

    Operational structural damage identification using de-noised modal feature in machine learning / Chen Shilei by Chen , Shilei

    Published 2021
    “…By integrating ISMA, both supervised and unsupervised machine learning algorithms were investigated to develop real-time damage identification schemes. …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    Hybrid signal processing and machine learning algorithm for adaptive fault classification of wind farm integrated transmision line protection by Olufemi, Osaji Emmanuel, Othman, Mohammad Lutfi, Hizam, Hashim, Othman, Muhammad Murtadha, Ammar, Aker Elhadi Emhemed Alhaaj, Okeke, Chidiebere Akachukwu, Onuabuchi, Nwagbara Samuel

    Published 2019
    “…The supervised machine learning algorithm from Bayesian network classified 99.15 % faults correctly with the operation time of 0.01 s to produced best-generalized model with an RMS error value of 0.05 for single line-to-ground (SLG) fault identification and classification. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Study on crack detection using image processing techniques and deep learning – a survey by Saleem, Muhammad Asif, Senan, Norhalina, Ahmad, Rehan

    Published 2020
    “…So it very well may be done consequently by utilizing image processing. Deep learning algorithms have been used for the solution of multiple issues in the area of image classification. …”
    Get full text
    Get full text
    Article
  10. 10

    Design and implementation of a real-time adaptive learning algorithm controller for a 3-DOF parallel manipulator / Mustafa Jabbar Hayawi by Hayawi, Mustafa Jabbar

    Published 2015
    “…It was found from experimentation that the ALAC was able to improve the position control of the parallel manipulator and adjusted the weights according to changing condition and control the system without any changes in the controlling algorithm. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Real-time identification of an unmanned quadcopter flight dynamics using fully tuned radial basis function network by Pairan, Mohammad Fahmi

    Published 2018
    “…The results also showed that the proposed extended minimal resource allocating networks (EMRAN) algorithm is capable to adapt with dynamics changes and infer quadcopter model with an even shorter training time (4.16ms) than MRAN and suitable for real-time system identification.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Online system identification development based on recursive weighted least square neural networks of nonlinear hammerstein and wiener models. by Kwad, Ayad Mahmood

    Published 2022
    “…System identification can be made offline, but this method has a disadvantage because the features of a dynamic system may change over time. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Deep plant: A deep learning approach for plant classification / Lee Sue Han by Lee , Sue Han

    Published 2018
    “…They look for the procedures or algorithms that maximize the use of leaf databases for plant predictive modelling, but this results in leaf features which are liable to change with different leaf data and feature extraction techniques. …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17

    Adaptive multi-parent crossover GA for feature optimization in epileptic seizure identification by Al-Sharhan, Salah, Bimba, Andrew

    Published 2019
    “…Hence, an automated process is required for such identification. The proposed approach in this work tends to tackle the multiple EEG channels problem by segmenting the EEG signals in the frequency domain based on changing spikes rather than the traditional time based windowing approach. …”
    Get full text
    Get full text
    Article
  18. 18

    Feature extraction and supervised learning for volatile organic compounds gas recognition by Mohd Tombel, Nor Syahira, Mohd Zaki, Hasan Firdaus, Mohd Fadglullah, Hanna Farihin

    Published 2023
    “…This research project aims to investigate effective feature extraction techniques that can be employed as discriminative features for machine learning algorithms. A preliminary dataset was used to predict VOC classification through the application of five supervised machine learning algorithms: k-Nearest Neighbors (kNN), Random Forest (RF), Support Vector Machines (SVM), Logistic Regression (LR), and Artificial Neural Networks (ANN). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Exploring Text Recognition Segmentation and Detection in Natural Scene Images by Wydyanto, ., Maria, Ulfa

    Published 2024
    “…This paper aims to provide a comprehensive review of the latest algorithms for text detection, segmentation, and recognition from natural scene images. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Characterizing land use/land cover change dynamics by an enhanced random forest machine learning model: a Google Earth Engine implementation by Pande C.B., Srivastava A., Moharir K.N., Radwan N., Mohd Sidek L., Alshehri F., Pal S.C., Tolche A.D., Zhran M.

    Published 2025
    “…The present investigation further enabled the interpretation of pixel-level LULC interactions while improving image classification accuracy and suggested the best models for the classification of LULC maps through the identification of changes in LULC classes. ? The Author(s) 2024.…”
    Article