Search Results - (( java application learning algorithm ) OR ( its implementation learning algorithm ))
Search alternatives:
- implementation learning »
- application learning »
- learning algorithm »
- its implementation »
- java application »
-
1
-
2
Training functional link neural network with ant lion optimizer
Published 2020“…This paper proposed the implementation of Ant Lion Algorithm as learning algorithm to train the FLNN for classification tasks. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
3
Mobile machine vision for railway surveillance system using deep learning algorithm
Published 2021“…In order to overcome this issue, machine vision embedded with deep learning algorithm can be implemented. Obstacle detection can be achieved through vision-based object detection, where the object classification model computes the images similarity to its respective classes, classifying its potential as an obstacle. …”
Get full text
Get full text
Get full text
Get full text
Proceedings -
4
-
5
DEEP LEARNING ALGORITHM IMPLEMENTATION FOR SHIP DETECTION IN SPOT SATELLITE IMAGES
Published 2019“…The deep-learning algorithm to be deployed is Faster R-CNN and to be implemented using MATLAB. …”
Get full text
Get full text
Final Year Project -
6
An Educational Tool Aimed at Learning Metaheuristics
Published 2020“…In this paper, we introduce an education tool for learning metaheuristic algorithms that allows displaying the convergence speed of the corresponding metaheuristic upon setting/changing the dependable parameters. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
7
A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment
Published 2013“…The methodology used consists of theoretical study, design of formal framework on intelligent software quality, identification of Feature Ranking Technique (FRT), construction and evaluation of FRA algorithm. The assessment of quality attributes has been improved using FRA algorithm enriched with a formula to calculate the priority of attributes and followed by learning adaptation through Java Library for Multi Label Learning (MULAN) application. …”
Get full text
Get full text
Get full text
Thesis -
8
Autonomous path planning robot using geographical information
Published 2008Get full text
Learning Object -
9
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…This thesis is based on the application of sentiment classification algorithm to tweet data with the goal of classifying messages based on the polarity of sentiment towards a particular topic (or subject matter). …”
Get full text
Get full text
Get full text
Thesis -
10
Hybrid bat algorithm-artificial neural network for modeling operating photovoltaic module temperature: article / Noor Rasyidah Hussin
Published 2014“…Bat algorithm was employed to optimize the training parameters such as learning rate, momentum rate and number of neurons in hidden layers. …”
Get full text
Get full text
Article -
11
Students’ attitude towards video-based learning: machine learning analysis with rapid software / Abdullah Sani Abd Rahman ... [et al.]
Published 2022“…In supporting the intervention approaches, machine learning techniques have been widely utilized. Another challenge is the difficulty to implement machine learning analysis by the educators. …”
Get full text
Get full text
Get full text
Article -
12
Optimization Of Two-Dimensional Dual Beam Scanning System Using Genetic Algorithms
Published 2008“…This algorithm has been tested and implemented successfully via a dual beam optical scanning system.…”
Get full text
Get full text
Thesis -
13
Music Recommender System Using Machine Learning Content-Based Filtering Technique
Published 2022“…Machine Learning allows a system to learn gradually to improve its accuracy in predicting future outcome. …”
Get full text
Get full text
Undergraduates Project Papers -
14
Hybrid bat algorithm hybrid-artificial neural network for modeling operating photovoltaic module temperature / Noor Rasyidah Hussin
Published 2014“…Bat algorithm was employed to optimize the training parameters such as learning rate, momentum rate and number of neurons in hidden layers. …”
Get full text
Get full text
Thesis -
15
Active force control with iterative learning control algorithm for a vehicle suspension
Published 2013“…ILC algorithm is implemented into AFC-based control scheme to reduce its complexity and hence faster response, by replacing the use of artificial intelligence (Al) method as proposed by previous researcher. …”
Get full text
Get full text
Thesis -
16
Development Of Machine Learning User Interface For Pump Diagnostics
Published 2022Get full text
Get full text
Monograph -
17
Multi-Backpropagation network
Published 2002“…In most cases, Neural Network considered large amount of data, as it will be teach to learn or memorize the data as the knowledge. The learning mechanism for Neural Network is its learning algorithm. …”
Get full text
Get full text
Conference or Workshop Item -
18
-
19
Design and Implementation of a Robot for Maze-Solving using Flood-Fill Algorithm
Published 2012“…This paper describes an implementation of a maze-solving robot designed to solve a maze based on the flood-fill algorithm. …”
Get full text
Get full text
Get full text
Citation Index Journal -
20
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…The proposed security architecture is constructed as an adaptive way-forward Internet-of-Things (IoT) friendly security solution that is comprised of three cyclic parts: learn, predict and prevent. A novel security component named â��intelligent security engineâ�� is introduced which learns the possible occurrences of security threats on SOA using artificial neural networks learning algorithms, then it predicts the potential attacks on SOA based on obtained results by the developed theoretical security model, and the written algorithms as part of security solution prevent the SOA attacks. …”
Get full text
Get full text
Article
