Search Results - (( development training normalization algorithm ) OR ( java data function algorithm ))

Refine Results
  1. 1

    Fuzzy modeling using Bat Algorithm optimization for classification by Noor Amidah, Ahmad Sultan

    Published 2018
    “…A Sazonov Engine which is a fuzzy java engine is use to apply Bat Algorithm in the experiment. …”
    Get full text
    Get full text
    Get full text
    Undergraduates Project Papers
  2. 2

    Autoreclosure in Extra High Voltage Lines using Taguchi’s Method and Optimized Neural Networks by Desta, Zahlay F., K.S., Ramarao, Taj, Mohammed Baloch

    Published 2008
    “…The developed algorithm is effectively trained, verified and validated with a set of training, dedicated testing and validation data respectively.…”
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    Autoreclosure in Extra High Voltage Lines using Taguchi's Method and Optimized Neural Networks by Desta, Zahlay F., K.S., Rama Rao

    Published 2009
    “…The developed algorithm is effectively trained, verified and validated with a set of training, dedicated testing and validation data respectively.…”
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    Logic Programming In Radial Basis Function Neural Networks by Hamadneh, Nawaf

    Published 2013
    “…The analysis revealed that performance of particle swarm optimization algorithm and Prey predator algorithm are better to use in training the networks. …”
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6

    Autoreclosure in extra high voltage lines using taguchi's method and optimized neural networks by K.S.R, Rao, F. D., Zahlay

    Published 2008
    “…The developed algorithm is effectively trained, verified and validated with a set of training, dedicated testing and validation data respectively. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    A new machine learning-based hybrid intrusion detection system and intelligent routing algorithm for MPLS network by Mohammad Azmi Ridwan, Dr.

    Published 2023
    “…This thesis proposes a hybrid ML-based intrusion detection system (ML-IDS) and ML-based intelligent routing algorithm (ML-RA) for MPLS network. The research is divided into three parts, which are (1) dataset development, (2) algorithm development, and (3) algorithm performance evaluation. …”
    text::Thesis
  8. 8

    Image clustering comparison of two color segmentation techniques by Subramaniam, Kavitha Pichaiyan

    Published 2010
    “…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    Development of intrusion detection system using residual feedforward neural network algorithm by Rustam, Rushendra, Ramli, Kalamullah, Hayati, Nur, Ihsanto, Eko, Gunawan, Teddy Surya, Halbouni, Asmaa Hani

    Published 2022
    “…This paper introduces a novel, efficient, and accurate approach for real-time intrusion detection and classification based on the Residual Feedforward Neural Network (RFNN) algorithm. The RFNN algorithm is developed to avoid overfitting, improve detection accuracy, and accelerate training and inference. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  10. 10

    AUTONOMOUS POWER LINE INSPECTION USING COMPUTER VISION by LAW, JIN MING

    Published 2022
    “…The developed algorithm is trained on the augmented Chinese Power Line Insulator Dataset (CPLID) that consisted of normal and missing cap insulator images. …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  11. 11

    Taguchi's method for optimized neural network based autoreclosure in extra high voltage lines by K.S.R., Rao, Z.F., Desta

    Published 2008
    “…The developed algorithm is verified with dedicated testing data. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12

    SANAsms: Secure short messaging system for secure GSM mobile communication by Anuar, N.B., Azlan, I.M., Wahid, A.W.A., Zakaria, O.

    Published 2008
    “…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    Application Of Neural Network In Malaria Parasites Classification by Lim, Chia Li

    Published 2006
    “…Multilayer Perceptron (MLP) network and Radial Basis Function (RBF) network will be developed using MATLAB in which MLP network is trained with Back Propagation, Bayesian Rule and Levenberg-Marquardt learning algorithm and RBF network is trained with k-means clustering algorithm. …”
    Get full text
    Get full text
    Monograph
  14. 14
  15. 15

    Characterization of oil palm fruitlets using artificial neural network by Olukayode, Ojo Adedayo

    Published 2014
    “…The results also showed that contrary to the widely reported gap between the accuracy of the LM algorithm and other feed forward neural network training algorithms, the RP trained network performed as good as that of the LM algorithm for the range of data considered. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Predictions of isolate and normal pentene of debutanizer catalytic reforming unit by using artificial neural network by S., Sulaiman, O.A., Abdalla, M.N., Zakaria, W.F.W., Ahmad

    Published 2008
    “…Back-propagation algorithm was used to train the network. A correlation coefficient of 0.999 was obtained with standard deviation of 0.006 for iC<sub>5</sub>. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17

    Forensic language of property theft genre based on mathematical formulae and machine learning algorithms / Hana' Abd Razak by Abd Razak, Hana'

    Published 2020
    “…Towards achieving better detection in real-time environment, colour pixel-based images were trained on five pre-trained CNNs using transfer learning algorithm. …”
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19

    Self-Adaptive Autoreclosing Scheme usingI Artificial Neural Network and Taguchi's Methodology in Extra High Voltage Transmission Systems by Desta, Zahlay Fitiwi

    Published 2009
    “…The fault identification prior to reclosing is based on optimized artificial neural network associated with three training algorithms, namely, Standard Error Back-Propagation, Levenberg Marquardt and Resilient Back-Propagation algorithms. …”
    Get full text
    Get full text
    Thesis
  20. 20

    The development of extra axial brain tumor detection prototype using back propagation based neural network / Suriyanti Panagen by Panagen, Suriyanti

    Published 2006
    “…Knowledge appearance is compulsory for neural network in which it comes under the training phase before it recognize or detecting any pattern.A study about the artificial neural network has been done and back propagation training algorithm is suitable for this system development. …”
    Get full text
    Get full text
    Thesis