Search Results - (( development training data algorithm ) OR ( java implication based algorithm ))
Search alternatives:
- development training »
- implication based »
- java implication »
- data algorithm »
- training data »
-
1
Enhancement of bearing defect diagnosis via genetic algorithm optimized feature selection
Published 2015“…This is due to the features selected in this classifier is over-fitted to the training data and not generalized for variations in testing data. …”
Get full text
Get full text
Get full text
Thesis -
2
Sentiment classification for malay newspaper using clonal selection algorithm / Nur Fitri Nabila Mohamad Nasir
Published 2013“…The experimental results show that our method can achieve better performance in clonal selection algorithm sentiment classification and the data collected cannot be used at once in this model because training data is very time-consuming if using all the data. …”
Get full text
Get full text
Thesis -
3
Development of Machine Learning Algorithm for Acquiring Machining Data in Turning Process
Published 2004“…The design network is trained by presenting several target machining data that the network must learn according to a learning rule (algorithm). …”
Get full text
Get full text
Thesis -
4
Improving Classification of Remotely Sensed Data Using Best Band Selection Index and Cluster Labelling Algorithms
Published 2005“…Methods for improving supervised and unsupervised classification of remotely sensed data were developed in this study. Supervised classification of remotely sensed data requires systematic collection of training samples for classes of interest. …”
Get full text
Get full text
Thesis -
5
-
6
Comparison of feed forward neural network training algorithms for intelligent modeling of dielectric properties of oil palm fruitlets
Published 2014“…In this study, an Artificial Neural Network (ANN) was designed, optimized and deployed to model the dielectric phenomena of microwave interacting with oil palm fruitlets within the frequency range of 2-4GHz. The ANN training data were obtained from Open-ended Coaxial Probe (OCP) microwave measurements and the quasi-static admittance model, the ANN was trained with four different training algorithms: Levenberg Marquardt (LM) algorithm, Gradient Descent with Momentum (GDM) algorithm, Resilient Backpropagation (RP) algorithm and Gradient Descent with Adaptive learning rate (GDA) algorithm. …”
Get full text
Get full text
Get full text
Article -
7
-
8
Water level forecasting using feed forward neural networks optimized by African Buffalo Algorithm (ABO)
Published 2019“…Due to that, many algorithms employ different training algorithms to guide the network for providing an accurate result with less training and testing error. …”
Get full text
Get full text
Thesis -
9
Toxic Gas Dispersion Model Based On Neural Pattern Recognition Networks
Published 2022“…Following the best selection of neural network algorithm, BR algorithm is further trained using 50-70% training with 10-28 hidden neurons. …”
Get full text
Get full text
Monograph -
10
E-Handrawn Calculator
Published 2008“…The purpose of this project is to demonstrate an application of back-propagation network (comparison of training their algorithms and transfer function) in order to developing e-Hand-Drawn Calculator. …”
Get full text
Get full text
Final Year Project -
11
Development of classification algorithms of human gait
Published 2022“…Thus, this study aims to develop a classification algorithm that can effectively classify subjects with relatively simplified input data. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
12
Sentiment analysis using negative selection algorithm for Twitter’s messages / Nazirah Che Alhadi
Published 2012“…Second experiment was carried out by reducing the data to 240 for training data and 60 data for testing. …”
Get full text
Get full text
Thesis -
13
Octane number prediction for gasoline blends using convolution neural network / Zhu Yue
Published 2021“…At present, there are many prediction algorithms based on machine learning. According to the "80/20 rule" for building machine learning model, 80% of the time is spent of finding, cleaning, and organizing data, while the remaining 20% for training of the machine learning model. …”
Get full text
Get full text
Get full text
Thesis -
14
Autoreclosure in Extra High Voltage Lines using Taguchi’s Method and Optimized Neural Networks
Published 2008“…The developed algorithm is effectively trained, verified and validated with a set of training, dedicated testing and validation data respectively.…”
Get full text
Get full text
Conference or Workshop Item -
15
Autoreclosure in Extra High Voltage Lines using Taguchi's Method and Optimized Neural Networks
Published 2009“…The developed algorithm is effectively trained, verified and validated with a set of training, dedicated testing and validation data respectively.…”
Get full text
Get full text
Conference or Workshop Item -
16
Sentiment analysis for malay newspaper (SAMNews) using negative selection algorithm / Nur Amalina Redzuan
Published 2013“…While in Experiment III used 900 newspaper’s sentences as the training data and 100 newspaper’s sentences as the testing data and the accuracy is unproved to 65.81%. …”
Get full text
Get full text
Thesis -
17
Semi-supervised learning for feature selection and classification of data / Ganesh Krishnasamy
Published 2019“…In these experiments, all the training and testing data are represented as feature vectors. …”
Get full text
Get full text
Get full text
Thesis -
18
-
19
Hybrid bat algorithm-artificial neural network for modeling operating photovoltaic module temperature: article / Noor Rasyidah Hussin
Published 2014“…Bat algorithm was employed to optimize the training parameters such as learning rate, momentum rate and number of neurons in hidden layers. …”
Get full text
Get full text
Article -
20
Using streaming data algorithm for intrusion detection on the vehicular controller area network
Published 2022“…In this paper, the adapted streaming data Isolation Forest (iForestASD) algorithm has been applied to CAN intrusion detection. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper
