Search Results - (( development training evolution algorithm ) OR ( java data function algorithm ))

Refine Results
  1. 1
  2. 2

    Fuzzy modeling using Bat Algorithm optimization for classification by Noor Amidah, Ahmad Sultan

    Published 2018
    “…A Sazonov Engine which is a fuzzy java engine is use to apply Bat Algorithm in the experiment. …”
    Get full text
    Get full text
    Get full text
    Undergraduates Project Papers
  3. 3

    Water level forecasting using feed forward neural networks optimized by African Buffalo Algorithm (ABO) by Ahmed, Ehab Ali

    Published 2019
    “…Due to that, many algorithms employ different training algorithms to guide the network for providing an accurate result with less training and testing error. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Differential evolution for neural networks learning enhancement by Ismail Wdaa, Abdul Sttar

    Published 2008
    “…Three programs have developed; Differential Evolution Neural Network (DENN), Genetic Algorithm Neural Network (GANN) and Particle Swarm Optimization with Neural Network (PSONN) to probe the impact of these methods on ANN learning using various datasets. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    Nonlinear modeling and control of a spark ignition engine idle speed / Hazem Mohamed by Hazem, Mohamed

    Published 1998
    “…The fuzzy controller is formulated as a radial basis function network trained by the orthogqnalleast squares algorithm to estimate the controller parameters. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Nonlinear identification of a small scale unmanned helicopter using optimized NARX network with multiobjective differential evolution by Tijani, Ismaila B., Akmeliawati, Rini, Legowo, Ari, Budiyono, Agus

    Published 2014
    “…This study proposes a hybrid of conventional back propagation training algorithm for the NARX network and multiobjective differential evolution (MODE) algorithm for identification of a nonlinear model of an unmanned small scale helicopter from experimental flight data.The proposed hybrid algorithm was able to produce models with Pareto-optimal compromise between the design objectives. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7
  8. 8

    Image clustering comparison of two color segmentation techniques by Subramaniam, Kavitha Pichaiyan

    Published 2010
    “…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    Identification and predictive control of spray tower system using artificial neural network and differential evolution algorithm by Danzomo, Bashir A., Salami, Momoh Jimoh Eyiomika, Khan, Md. Raisuddin

    Published 2015
    “…This includes the use of an artificial neural network (ANN) based predictive control strategy and differential evolution (DE) optimization algorithm to determines the optimal control signal, uk (liquid droplet size, dD) by minimizing the cost function such that the output is set below the allowable PM concentration. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  10. 10

    Y-type Random 2-satisfiability In Discrete Hopfield Neural Network by Guo, Yueling

    Published 2024
    “…Additionally, the proposed Hybrid Differential Evolution Algorithm was implemented into the training phase to ensure that the cost function of the Discrete Hopfield Neural Network is minimized. …”
    Get full text
    Get full text
    Thesis
  11. 11

    SANAsms: Secure short messaging system for secure GSM mobile communication by Anuar, N.B., Azlan, I.M., Wahid, A.W.A., Zakaria, O.

    Published 2008
    “…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12

    iBUST: An intelligent behavioural trust model for securing industrial cyber-physical systems by Azad, Saiful, Mahmud, Mufti, Kamal Zuhairi, Zamli, Kaiser, M. Shamim, Jahan, Sobhana, Razzaque, Md Abdur

    Published 2024
    “…For this intelligent TMM, a variant of Frequency Pattern Growth (FP-Growth), called enhanced FP-Growth (EFP-Growth) algorithm is developed by altering the internal data structures for faster execution and by developing a modified exponential decay function (MEDF) to automatically calculate minimum supports for adapting trust evolution characteristics. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Deep learning detector for pests and plant disease recognition by Ileladewa, Oluwatimilehin Adekunle

    Published 2020
    “…However, in this project, deep learning techniques are used in developing a model for diseases and pest detection in plants, and then train and test the model before eventually integrating the model into a mobile application. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  14. 14

    Web-based RIG performance reporting system using interactive visualization techniques / Amir Hambaly Nasaruddin by Nasaruddin, Amir Hambaly

    Published 2019
    “…For the user to analyze the result, the system provides visual analytics technique which can educate the user on analyzing the result which is drill down and sorting function to educate users. The result of this project is all algorithm for visualizing data is functioning and the output produced from the system is correct and effective. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography by Naji, Ahmed Wathik, Zaidan, B.B., Hameed, Shihab A., O-Khalifa, Othman

    Published 2009
    “…The system includes two main functions; first is the hiding of the information in unused area 2 of PE-file (.EXE file), through the execution of four process (specify the cover file, specify the information file, encryption of the information, and hiding the information) and the second function is the extraction of the hiding information through three process (specify the steno file, extract the information, and decryption of the information) and The proposed system is implemented by using java.…”
    Get full text
    Get full text
    Get full text
    Article
  16. 16
  17. 17

    Challenges of hidden data in the unused area two within executable files by Naji, Ahmed Wathik, Zaidan, A.A., Zaidan, B.B.

    Published 2009
    “…The designed algorithms were intended to help in proposed system aim to hide and retract information (data file) with in unused area 2 of any execution file(exe.file). …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Smart student timetable planner by Wong, Xin Tong

    Published 2025
    “…Course data is managed in CSV format, parsed into JSON for fast processing, while sessionStorage and localStorage handle user data within active sessions. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  19. 19

    Tacit knowledge for business intelligence framework using cognitive-based approach by Surbakti, Herison

    Published 2022
    “…The data transformed into cognitive maps to supply the data warehouse. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Application of the Hybrid Artificial Neural Network Coupled with Rolling Mechanism and Grey Model Algorithms for Streamflow Forecasting Over Multiple Time Horizons by Yaseen, Zaher Mundher, Fu, Minglei, Wang, Chen, Mohtar, Wan Hanna Melini Wan, Deo, Ravinesh C., El-Shafie, Ahmed

    Published 2018
    “…The pre-processed data was then integrated with two artificial neural network models, the back propagation (RMGM-BP) and Elman Recurrent Neural Network (RMGM-ERNN). The development, training, testing and evaluation of the proposed hybrid models were undertaken using streamflow data for two tropical hydrological basins (Johor and Kelantan Rivers). …”
    Get full text
    Get full text
    Article