Search Results - (( java _ implementation algorithm ) OR ( (parameter OR parameters) active learning algorithm ))
Search alternatives:
- implementation algorithm »
- learning algorithm »
- active learning »
-
1
A harmony search-based learning algorithm for epileptic seizure prediction
Published 2016“…The learning phase of wavelet neural network entails the task of finding the optimal set of parameter, which includes wavelet activation function, translation centers, dilation parameter, synaptic weight values, and bias terms. …”
Get full text
Get full text
Article -
2
Modeling time series data using Genetic Algorithm based on Backpropagation Neural network
Published 2018“…This study showed the task of optimizing the topology structure and the parameter values (e.g., weights) used in the BPNN learning algorithm by using the GA. …”
Get full text
Get full text
Thesis -
3
The effect of adaptive parameters on the performance of back propagation
Published 2012“…The activation functions are adjusted by the adaptation of gain parameters together with adaptive momentum and learning rate value during the learning process. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
4
Acceleration Strategies For The Backpropagation Neural Network Learning Algorithm
Published 2001“…The backpropagation algorithm has proven to be one of the most successful neural network learning algorithms. …”
Get full text
Get full text
Thesis -
5
PROPOSED METHODOLOGY FOR OPTIMIZING THE TRAINING PARAMETERS OF A MULTILAYER FEED-FORWARD ARTIFICIAL NEURAL NETWORKS USING A GENETIC ALGORITHM
Published 2011“…To overcome these limitations, there have been attempts to use genetic algorithm (GA) to optimize some of these parameters. …”
Get full text
Get full text
Thesis -
6
Class binarization with self-adaptive algorithm to improve human activity recognition
Published 2018“…WISDM consists of six different types physical activity, while PAMAP2 covers eighteen activities comprising various simple and complex activities. …”
Get full text
Get full text
Thesis -
7
RSA Encryption & Decryption using JAVA
Published 2006“…Today, with online marketing, banking, healthcare and other services, even the average householder is aware of encryption. The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
8
Differential evolution for neural networks learning enhancement
Published 2008“…In ANN, there are many elements need to be considered, and these include the number of input nodes, hidden nodes, output nodes, learning rate, momentum rate, bias parameter, minimum error and activation/transfer functions. …”
Get full text
Get full text
Get full text
Thesis -
9
Active force control with iterative learning control algorithm for a vehicle suspension
Published 2013“…The new control scheme named active force control with iterative learning control algorithm (AFCIL) is complemented by the classic proportionalintegral-derivative (PID) control incorporated and designed as the outermost control loop. …”
Get full text
Get full text
Thesis -
10
Intelligent adaptive active force control of a robotic arm with embedded iterative learning algorithms
Published 2001“…The paper highlights a novel and robust method to control a robotic arm using an iterative learning technique embedded in an active force control strategy. …”
Get full text
Get full text
Get full text
Article -
11
Predicting Parkinson’s Disease Using Machine Learning with Voice Parameters and Handwriting Images
Published 2024“…This model takes advantage of both advanced machine learning algorithms and modern image processing techniques, resulting in effective and efficient prediction PD. …”
Get full text
Get full text
Get full text
Article -
12
Multi-step time series prediction using recurrent kernel online sequential extreme learning machine / Liu Zongying
Published 2019“…However, the problems with traditional offline and online learning algorithms in machine learning algorithms are usually faced with parameter dependency, concept drift handling problem, connectionless of neural net and unfixed reservoir. …”
Get full text
Get full text
Get full text
Thesis -
13
Adaptive active force control of a robotic arm employing twin iterative learning algorithms / Musa Mailah and Ong Miaw Yong
Published 2004“…The paper highlights a novel and robust method to control a robotic arm using iterative learning technique embedded in an active force control strategy. …”
Get full text
Get full text
Get full text
Article -
14
Activity recognition using optimized reduced kernel extreme learning machine (OPT-RKELM) / Yang Dong Rui
Published 2019“…One of the major research problems is the computation resources required by machine learning algorithm used for classification for HAR. …”
Get full text
Get full text
Get full text
Thesis -
15
Provider independent cryptographic tools
Published 2003“…The library is implemented by using Java cryptographic service provider framework that conforms to Java Cryptographic Architecture (JCA) and Java Cryptographic Extension (JCE). …”
Get full text
Get full text
Get full text
Monograph -
16
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
17
Application of nature-inspired algorithms and artificial intelligence for optimal efficiency of horizontal axis wind turbine / Md. Rasel Sarkar
Published 2019“…There have two most uses activation function namely tansig and logsig. The essence of this study is that it compares the effect of activation functions (tansig and logsig) in the performance of time series forecasting since activation function is the core element of any artificial neural network model. …”
Get full text
Get full text
Get full text
Thesis -
18
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…RSA is one of these encryption algorithms that have been implemented in security systems. …”
Get full text
Get full text
Thesis -
19
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
20
Particle swarm optimization for neural network learning enhancement
Published 2006“…To overcome this problem, Genetic Algorithm (GA) has been used to determine optimal value for BP parameters such as learning rate and momentum rate and also for weight optimization. …”
Get full text
Get full text
Thesis
