Search Results - (( developing activation function algorithm ) OR ( based detection method algorithm ))

Refine Results
  1. 1

    Test case generation from state machine with OCL constraints using search-based techniques / Aneesa Ali Ali Saeed by Aneesa Ali, Ali Saeed

    Published 2017
    “…The whole constraint analyzer and the fitness function were combined with four SBTs (genetic algorithm, evolutionary algorithm, simulating annealing, and quantum genetic algorithm). …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    Relevance detection and summarizing strategies identification algorithm using linguistic measures / Seyed Asadollah Abdiesfandani by Seyed Asadollah, Abdiesfandani

    Published 2016
    “…iii The summarizing strategies identification module relies on a set of heuristic rules, statistical and linguistic methods such as position-based method, title-based method, cue-phrase method and word-frequency method to identify the summarizing strategies employed by students. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Edge detection and contour segmentation for fruit classification in natural environment / Khairul Adilah Ahmad by Ahmad, Khairul Adilah

    Published 2018
    “…This improved algorithm, known as the edge-template Contour Delineation (etCD), is based on the fusion of edge detection with corner-template detection and dynamic thresholding to produce enhanced edge map. …”
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5

    Optimal distributed generation and load shedding scheme using artificial bee colony- hill climbing algorithm considering voltage stability and losses indices by Ali Abdallah, Ali Emhemed

    Published 2021
    “…The proposed solution is based on the optimization method developed from a combination of the Artificial Bee Colony and Hill Climbing algorithms (ABC-HC) to give the optimal placement and sizing of DG units to be deployed in the system. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Rangka kerja keselamatan transaksi bagi pelanggan pelayan berasaskan perdagangan elektronik by Abdullah, Abdul Hanan

    Published 2003
    “…Hashing function implementation have been using in this system as its cryptography algorithm. …”
    Get full text
    Get full text
    Monograph
  7. 7

    Forensic language of property theft genre based on mathematical formulae and machine learning algorithms / Hana' Abd Razak by Abd Razak, Hana'

    Published 2020
    “…Towards achieving better detection in real-time environment, colour pixel-based images were trained on five pre-trained CNNs using transfer learning algorithm. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Rough Neural Networks Architecture For Improving Generalization In Pattern Recognition by Ali Adlan, Hanan Hassan

    Published 2004
    “…The RSNN provides a novel methodology for designing nonlinear filters without prior knowledge of the problem domain. The RNN was used to detect patterns present in satellite image. A novel feature extraction algorithm was developed to extract the feature vectors. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Analysis of dysgraphic children based on letter position / Zarith Marissa Mustafa by Mustafa, Zarith Marissa

    Published 2015
    “…The experiments such as changing the learning rate and different type of activation function had been done in order to obtain the best result. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Intelligent Fuzzy Classifier for Pre-Seizure Detection from Real Epileptic Data by Shakir, Mohamed, Malik, Aamir Saeed, Kamel, Nidal S., Qidwai, Uvais

    Published 2014
    “…This gives a more practical functionality for such a system to be used in a wearable fashion over the existing Electroencephalogram (EEG) based seizure detection systems due to their complex pattern classification methodologies. …”
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    Intelligent Fuzzy Classifier for pre-seizure detection from real epileptic data by Shakir, M., Malik, A.S., Kamel, N., Qidwai, U.

    Published 2014
    “…This gives a more practical functionality for such a system to be used in a wearable fashion over the existing Electroencephalogram (EEG) based seizure detection systems due to their complex pattern classification methodologies. …”
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12
  13. 13

    Development of an Isolated Digit Speech Recognition Based on Multilayer Perceptron Model by Mohamad Hussin, Ummu Salmah

    Published 2004
    “…In preprocessing phase, a new endpoint detection method is proposed and it is known as variance method. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Automatic identification of epileptic seizures from EEG signals using sparse representation-based classification by Sobhan Sheykhivand, Tohid Yousefi Rezaii, Zohreh Mousavi, Azra Delpak, Ali Farzamnia

    Published 2020
    “…Compared to state-of-the-art algorithms and other common methods, our method outperformed them in terms of sensitivity, specificity, and accuracy. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Smart student timetable planner by Wong, Xin Tong

    Published 2025
    “…Course data is managed in CSV format, parsed into JSON for fast processing, while sessionStorage and localStorage handle user data within active sessions. A Genetic Algorithm forms the core scheduling engine, generating optimized timetables that respect both hard constraints, such as avoiding clashes, and soft constraints, such as personal preferences.The final output of this project is a functional web-based timetable planner that successfully enhances scheduling efficiency, reduces the likelihood of errors, and improves the overall academic planning experience. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  16. 16

    Edge Detection Algorithm For Image Processing Of Search And Rescue Robot by A/L Sivem, Prasanthran

    Published 2016
    “…This paper highlights the various edge detection algorithms working method and comparison is made based on the advantages and disadvantages of the algorithms for the identification of an optimum edge detection algorithm. …”
    Get full text
    Get full text
    Final Year Project
  17. 17

    Optimised content-social based features for fake news detection in social media using text clustering approach by Yahya, Adnan Hussein Ali

    Published 2025
    “…In general, the process of fake news detection was conducted in two different phases, the topic detection phase using a graph-based unsupervised clustering method based on HFPA and Markov Clustering Algorithm (MCL) called (HFPA-MCL) and the fake news detection phase using an unsupervised clustering method based on K-means algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    Development of electromyography-controlled 3D printed robot hand and supervised machine learning for signal classification by Abdul Wahit, Mohamad Aizat

    Published 2019
    “…The electronic hardware and hand robot structure were integrated to develop an EMG controlled hand robot prototype, and its functionality was tested through three stages: muscular activity detection only, object detection only and the integration of both detection in an algorithm to control the hand robot structure movement to perform opened hand palm and some grasping postures with two trial for each stage. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Machine learning algorithms in context of intrusion detection by Mehmood, T., Rais, H.B.Md.

    Published 2016
    “…Asymmetrically, anomaly based detection method can detect novel attacks but it has high false positive rate. …”
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20

    Algorithm enhancement for host-based intrusion detection system using discriminant analysis by Dahlan, Dahliyusmanto

    Published 2004
    “…Algorithms for building detection models are usually classified into two categories: misuse detection and anomaly detection. …”
    Get full text
    Get full text
    Thesis