Search Results - (( data optimization method algorithm ) OR ( software extraction method algorithm ))
Search alternatives:
- software extraction »
- data optimization »
- extraction method »
- method algorithm »
-
1
Autoreclosure in Extra High Voltage Lines using Taguchi’s Method and Optimized Neural Networks
Published 2008“…The fault identification prior to reclosing is based on optimized artificial neural network associated with standard Error Back-Propagation, Levenberg Marquardt Algorithm and Resilient Back-Propagation training algorithms together with Taguchi’s Method. …”
Get full text
Get full text
Conference or Workshop Item -
2
Autoreclosure in Extra High Voltage Lines using Taguchi's Method and Optimized Neural Networks
Published 2009“…The fault identification prior to reclosing is based on optimized artificial neural network associated with standard Error Back-Propagation, Levenberg Marquardt Algorithm and Resilient Back-Propagation training algorithms together with Taguchi’s Method. …”
Get full text
Get full text
Conference or Workshop Item -
3
Taguchi's method for optimized neural network based autoreclosure in extra high voltage lines
Published 2008“…The fault identification prior to reclosing is based on optimized artificial neural network associated with Levenberg Marquardt algorithm to train the ANN and Taguchi's Method to find optimal parameters of the algorithm and number of hidden neurons. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
4
Voting algorithms for large scale fault-tolerant systems
Published 2011“…By extracting various plots from different aspects, we demonstrated that, compared to the basic algorithm, our algorithm has higher reliability and availability as the quantity of the input data increases. …”
Get full text
Get full text
Thesis -
5
A new ant based rule extraction algorithm for web classification
Published 2011“…Methods to reduce the number of attributes and discretization are two important data pre-processing steps before the data can be used for classification activity. …”
Get full text
Get full text
Get full text
Get full text
Monograph -
6
Autoreclosure in extra high voltage lines using taguchi's method and optimized neural networks
Published 2008“…The fault identification prior to reclosing is based on optimized artificial neural network associated with standard Error Back-Propagation, Levenberg Marquardt Algorithm and Resilient Back-Propagation training algorithms together with Taguchi's Method. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
7
An efficient IDS using hybrid Magnetic swarm optimization in WANETs
Published 2018“…In order to improve the effectiveness of intrusion detection systems (IDSs), data analysis methods such as data mining and classification methods are often integrated with IDSs. …”
Get full text
Get full text
Get full text
Get full text
Article -
8
Efficient classifying and indexing for large iris database based on enhanced clustering method
Published 2018“…The proposed method can be used to perform global search and exhibits quick convergence rate while optimizing the initial clustering centers of the K-means algorithm. …”
Get full text
Get full text
Get full text
Article -
9
A new model for iris data set classification based on linear support vector machine parameter's optimization
Published 2020“…In this study, we proposed a newly mode for classifying iris data set using SVM classifier and genetic algorithm to optimize c and gamma parameters of linear SVM, in addition principle components analysis (PCA) algorithm was use for features reduction.…”
Get full text
Get full text
Get full text
Article -
10
A COLLABORATIVE FRAMEWORK FOR ANDROID MALWARE IDENTIFICATION USING DYNAMIC ANALYSIS
Published 2019“…The scope of this project focuses on Android Malware detection by using dynamic analysis. The methods to implement this project is through data collection, feature extraction, feature selection, and classification process. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
11
Software module clustering: An in-depth literature analysis
Published 2022“…The obtained data were then used to answer several research questions regarding state-of-the-art clustering approaches, applications of clustering in software engineering, clustering processes, clustering algorithms, and evaluation methods. …”
Get full text
Get full text
Get full text
Article -
12
Enhancing project completion date prediction using a hybrid model: rule-based algorithm and machine learning algorithm
Published 2025“…The study employs a hybrid predictive model that combines Big Data technologies, Extract Load Transfer (ELT) processes, rule-based algorithms (RBA), machine learning (ML), and Power BI visualizations. …”
Get full text
Get full text
Get full text
Article -
13
Specific heat capacity extraction of soybean oil/mxene nanofluids using optimized long short-term memory
Published 2024“…In comparison, 5% is used for testing and validation purposes of the developed algorithm. The newly proposed optimized SVR, GMDH, MLP, and LSTM are modelled in MATLAB software. …”
Get full text
Get full text
Get full text
Article -
14
Augmenting the Robustness and Efficiency of Violence Detection Systems for Surveillance and Non-Surveillance Scenarios
Published 2022“…With the increasing availability of video data from surveillance cameras and social media platforms, the need for accurate and efficient violence detection algorithms has become paramount. …”
Get full text
Get full text
Get full text
Article -
15
A study on component-based technology for development of complex bioinformatics software
Published 2004“…The second layer uses discriminative SVM algorithm with a state-of-the-art string kernel based on PSI-BLAST profiles that is used to leverage the unlabeled data. …”
Get full text
Get full text
Monograph -
16
Brewing perfection: real-time monitoring of arabic coffee using iot and machine learning
Published 2026“…The system demonstrated high efficiency and accuracy in performance, mimicking human coffee brewing methods. The results demonstrate the potential of the YOLOv8 algorithm to automate and optimize routine tasks with high accuracy.…”
Get full text
Get full text
Get full text
Proceeding Paper -
17
-
18
Pothole detection using multispectral sensor and unmanned aerial vehicle imagery / Muhammad Hafiz Aizuddin Mohd Zaidi
Published 2024“…In earlier times, conventional methods such as field investigations and manual measurements were utilized to collect data and assess pavement distresses. …”
Get full text
Get full text
Thesis -
19
-
20
