Search Results - (( developing activation function algorithm ) OR ( data detection based algorithm ))
Search alternatives:
- developing activation »
- function algorithm »
- detection based »
- data detection »
-
1
Test case generation from state machine with OCL constraints using search-based techniques / Aneesa Ali Ali Saeed
Published 2017“…In the proposed search-based test data generator, a whole constraints analyzer and a fitness function that evolves itself based on the error feedback were proposed. …”
Get full text
Get full text
Get full text
Thesis -
2
Real-time measurement and gait detection algorithm for motion control of active ankle foot orthosis / Aminuddin Hamid
Published 2015“…From the result analysis, the developed control algorithm shows that the realtime GRF measurement has the ability to enhance the AAFO functional performance and improve the patient gait.…”
Get full text
Get full text
Thesis -
3
Edge detection and contour segmentation for fruit classification in natural environment / Khairul Adilah Ahmad
Published 2018“…This learning algorithm represents an automatic generation of membership functions and rules from the data. …”
Get full text
Get full text
Thesis -
4
Rangka kerja keselamatan transaksi bagi pelanggan pelayan berasaskan perdagangan elektronik
Published 2003“…Hashing function implementation have been using in this system as its cryptography algorithm. …”
Get full text
Get full text
Monograph -
5
-
6
Forensic language of property theft genre based on mathematical formulae and machine learning algorithms / Hana' Abd Razak
Published 2020“…Towards achieving better detection in real-time environment, colour pixel-based images were trained on five pre-trained CNNs using transfer learning algorithm. …”
Get full text
Get full text
Thesis -
7
Rough Neural Networks Architecture For Improving Generalization In Pattern Recognition
Published 2004“…The RSNN provides a novel methodology for designing nonlinear filters without prior knowledge of the problem domain. The RNN was used to detect patterns present in satellite image. A novel feature extraction algorithm was developed to extract the feature vectors. …”
Get full text
Get full text
Thesis -
8
Analysis of dysgraphic children based on letter position / Zarith Marissa Mustafa
Published 2015“…This project consists of six phases which are information gathering, data collection, preliminary data analysis, system design and development, performance evaluation and documentation. …”
Get full text
Get full text
Thesis -
9
Intelligent Fuzzy Classifier for Pre-Seizure Detection from Real Epileptic Data
Published 2014“…This gives a more practical functionality for such a system to be used in a wearable fashion over the existing Electroencephalogram (EEG) based seizure detection systems due to their complex pattern classification methodologies. …”
Get full text
Get full text
Conference or Workshop Item -
10
Automatic detection and indication of pallet-level tagging from rfid readings using machine learning algorithms
Published 2020“…The ensemble learning technique, changes of activation function in Neural Network as well as the unsupervised learning (k-means clustering algorithm and Friis Transmission Equation) was also applied to classify the multiclass classification in pallet-level. …”
Get full text
Get full text
Thesis -
11
Real time traceability module for halal logistic transportation using GPS and geofence technique
Published 2016“…This study presents a merged traceability module of GPS tracking system technology with geofence algorithm, entitled the Halal tracer. The significance of Halal tracer traceability module is that it mainly benefits in providing automatic detection on the spatial activity undergone during the shipment process of the Halal goods. …”
Get full text
Get full text
Thesis -
12
Intelligent Fuzzy Classifier for pre-seizure detection from real epileptic data
Published 2014“…This gives a more practical functionality for such a system to be used in a wearable fashion over the existing Electroencephalogram (EEG) based seizure detection systems due to their complex pattern classification methodologies. …”
Get full text
Get full text
Conference or Workshop Item -
13
Smart student timetable planner
Published 2025“…Course data is managed in CSV format, parsed into JSON for fast processing, while sessionStorage and localStorage handle user data within active sessions. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
14
Development of an Isolated Digit Speech Recognition Based on Multilayer Perceptron Model
Published 2004“…In this sense, the slope of the activation function is adjusted to gain highest recognition rate. …”
Get full text
Get full text
Thesis -
15
Design and Modelling of an Energy Aware Dynamic Management for Wireless Sensor Node with Dual Harvesters
Published 2020“…The function of the algorithm is to detect the energy sources availability and control the nodes' sleeping period accordingly. …”
Get full text
Get full text
Get full text
Thesis -
16
Automatic identification of epileptic seizures from EEG signals using sparse representation-based classification
Published 2020“…Compared to state-of-the-art algorithms and other common methods, our method outperformed them in terms of sensitivity, specificity, and accuracy. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
17
-
18
Artificial immune system based on real valued negative selection algorithms for anomaly detection
Published 2015“…This shows that the Negative Selection Algorithms are equipped with the capabilities of detecting changes in data, thus appropriate for anomaly detection. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
19
Incremental learning for large-scale stream data and its application to cybersecurity
Published 2015“…In Chapter 2, we propose a new algorithm based on incremental Radial Basis Function Network (RBFN) to accelerate the learning in stream data. …”
Get full text
Get full text
Thesis -
20
Algorithm enhancement for host-based intrusion detection system using discriminant analysis
Published 2004“…Misuse detection algorithms model know attack behavior. They compare sensor data to attack patterns learned from the training data. …”
Get full text
Get full text
Thesis
