Search Results - (( java adaptation optimization algorithm ) OR ( data orientation learning algorithm ))
Search alternatives:
- adaptation optimization »
- orientation learning »
- learning algorithm »
- data orientation »
- java adaptation »
-
1
Parallel distributed genetic algorithm development based on microcontrollers framework
Published 2023Conference paper -
2
The new efficient and accurate attribute-oriented clustering algorithms for categorical data
Published 2012“…Four real-life data sets obtained from University of California Irvine (UCI) machine learning repository and ten synthetically generated data sets are used to evaluate MGR and IG-ANMI algorithms, and other four algorithms are used to compare with these two algorithms. …”
Get full text
Get full text
Thesis -
3
Predicting Student Performance in Object Oriented Programming Using Decision Tree : A Case at Kolej Poly-Tech Mara, Kuantan
Published 2013“…The paper focuses on prediction of student learning performance in object oriented programming course using data mining technique based on a dataset obtained from Kolej Poly-Tech Mara (KPTM), Kuantan. …”
Get full text
Get full text
Conference or Workshop Item -
4
Development of Machine Learning Algorithm for Acquiring Machining Data in Turning Process
Published 2004“…The design network is trained by presenting several target machining data that the network must learn according to a learning rule (algorithm). …”
Get full text
Get full text
Thesis -
5
Multi-sensor fusion and deep learning framework for automatic human activity detection and health monitoring using motion sensor data / Henry Friday Nweke
Published 2019“…In the second method utilizing deep learning and orientation invariant features for human activity detection. …”
Get full text
Get full text
Get full text
Thesis -
6
Study of machine learning in computer vision using Raspberry Pi
Published 2024text::Final Year Project -
7
-
8
-
9
Evaluation of Convolutional Neural Network based on Dental Images for Age Estimation
Published 2023Conference Paper -
10
Investigating optimal smartphone placement for identifying stairs movement using machine learning
Published 2023“…The data was trained against 6 machine learning algorithms namely Decision Tree, Logistic Regression, Naive Bayes, Random Forest, Neural Networks and KNN. …”
Get full text
Get full text
Get full text
Get full text
Article -
11
-
12
Automated Bird Species Identification Through Machine Learning Techniques
Published 2024“…In recent years, machine learning algorithms and pre-trained models such as ResNet, Histogram of Oriented Gradients (HOG), and Scale-Invariant Feature Transform (SIFT) have shown significant promise in automating bird species classification. …”
Get full text
Get full text
Get full text
Get full text
Article -
13
Adaptive Non-Stationary Cardiac Signals Identification using an Augmented MLP Network
Published 2007“…In this paper hybrid form recursive training algorithms, which combines both linear and nonlinear orientation of weights, is being used to model or identify ElectroCardioGraphy (ECG) signals. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
14
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…The proposed security architecture is constructed as an adaptive way-forward Internet-of-Things (IoT) friendly security solution that is comprised of three cyclic parts: learn, predict and prevent. A novel security component named â��intelligent security engineâ�� is introduced which learns the possible occurrences of security threats on SOA using artificial neural networks learning algorithms, then it predicts the potential attacks on SOA based on obtained results by the developed theoretical security model, and the written algorithms as part of security solution prevent the SOA attacks. …”
Get full text
Get full text
Article -
15
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…The proposed security architecture is constructed as an adaptive way-forward Internet-of-Things (IoT) friendly security solution that is comprised of three cyclic parts: learn, predict and prevent. A novel security component named â��intelligent security engineâ�� is introduced which learns the possible occurrences of security threats on SOA using artificial neural networks learning algorithms, then it predicts the potential attacks on SOA based on obtained results by the developed theoretical security model, and the written algorithms as part of security solution prevent the SOA attacks. …”
Get full text
Get full text
Article -
16
A Review: Current Trend of Immersive Technologies for Indoor Navigation and the Algorithms
Published 2024“…Based on the findings of this review, we can conclude that an efficient solution for indoor navigation that uses the capabilities of embedded data and technological advances in immersive technologies can be achieved by training the shortest path algorithm with a deep learning algorithm to enhance the indoor navigation system.…”
Get full text
Get full text
Get full text
Article -
17
-
18
A framework for Malaysian Sign Language Recognition using deep learning initiatives / Imran Md Jelas
Published 2022“…LSTM, an ANN can recall both current data and past data. LTSM pertinent for vision-based sign language recognition system especially when continuous image is used as in the proposed framework.…”
Get full text
Get full text
Get full text
Article -
19
Anfis Modelling On Diabetic Ketoacidosis For Unrestricted Food Intake Conditions
Published 2017“…The project has also implemented the optimization process onto the proposed ANFIS model through the hybrid of Genetic Algorithm on the fuzzy membership function of the ANFIS model. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
20
Deep learning-based water segmentation for autonomous surface vessel
Published 2020“…One approach in implementing the task is through extracting waterlines to enable inferring of vessel orientation and obstacles presence. Classical computer vision algorithms for detection holds limitation in robustness and scalability. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper
