Search Results - (( java segmentation learning algorithm ) OR ( pattern solution learning algorithm ))

Refine Results
  1. 1

    Clustering ensemble learning method based on incremental genetic algorithms by Ghaemi, Reza

    Published 2012
    “…In the first and second phases, a threshold fuzzy c-means clustering algorithm as a clusterer and a pattern ensemble learning method based on the incremental genetic-based algorithms are proposed respectively. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Neural network algorithm development for Ion Sensitive Field Effect Transistor (ISFET) sensor / Muhammad Nasrul Hakim Adenan by Adenan, Muhammad Nasrul Hakim

    Published 2013
    “…The objective of this project is to develop ANN model for ISFET sensor that able to estimate the main ion in mixed solution by learning the pattern of the input and output of the sensor. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Neural network algorithm development for Ion Sensitive Field Effect Transistor (ISFET) sensor: article / Muhammad Nasrul Hakim Adenan and Maizatul Zolkapli by Hakim Adenan, Muhammad Nasrul, Zolkapli, Maizatul

    Published 2013
    “…The objective of this project is to develop ANN model for ISFET sensor that able to estimate the main ion in mixed solution by learning the pattern of the input and output of the sensor. …”
    Get full text
    Get full text
    Article
  4. 4
  5. 5

    Optimize and deploy machine learning algorithms on embedded devices for manufacturing applications by Teoh, Ming Xue

    Published 2025
    “…In recent studies, we seen developers and researchers proposing solutions on deep learning algorithms like YOLO, EfficientNet, CNN, MobileNet etc. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  6. 6

    Concrete surface inspection by using unmanned aerial vehicle (UAV) and deep learning algorithms YOLOv7 / Saffa Nasuha Rusdinadi by Rusdinadi, Saffa Nasuha

    Published 2024
    “…This research aims to improve the detection and analysis of cracks on concrete surfaces by utilizing UAVs and yolo algorithms. Uavs offer a versatile and cost-effective solution for capturing high-resolution orthophotos of large and hard-to-reach concrete structures. …”
    Get full text
    Get full text
    Student Project
  7. 7

    Concrete surface inspection by using Unmanned Aerial Vehicle (UAVs) and deep learning algorithms Yolov7 by Rusdinaidi, Saffa Nasuha, Hashim, Khairil Afendy, Ahmad Dahlan, Zaki

    Published 2024
    “…This research aims to evaluate the detection and analysis of cracks on concrete surfaces by utilizing Uavs and Yolo algorithms. Uavs offers a versatile and cost-effective solution for capturing high-resolution orthophotos of large and hard-to-reach concrete structures. …”
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8
  9. 9

    Underwater Image Recognition using Machine Learning by Divya, N.K., Manjula, Sanjay Koti, Priyadarshini, S

    Published 2024
    “…It encompasses the procedure for feeding algorithms information to create the algorithms realize patterns in the data and then increase the performance of the algorithms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Dyslexia handwriting detection using Convolutional Neural Network (CNN) algorithm / Sofea Najihah Mohd Zaki by Mohd Zaki, Sofea Najihah

    Published 2024
    “…Further enhancements might involve including machine learning algorithms to improve the prototype's accuracy by learning from a larger dataset, which would eventually improve the prototype's ability to offer deep understanding into handwriting patterns related to dyslexia.…”
    Get full text
    Get full text
    Thesis
  11. 11

    Machine learning using robust AI techniques / Prof. Madya Dr. Nordin Abu Bakar by Abu Bakar, Nordin (Prof. Madya Dr.)

    Published 2012
    “…Many algorithms have been applied to aid the assessment process. …”
    Get full text
    Get full text
    Research Reports
  12. 12

    Adaptive security architecture for protecting RESTful web services in enterprise computing environment by Beer, M.I., Hassan, M.F.

    Published 2018
    “…A novel security component named â��intelligent security engineâ�� is introduced which learns the possible occurrences of security threats on SOA using artificial neural networks learning algorithms, then it predicts the potential attacks on SOA based on obtained results by the developed theoretical security model, and the written algorithms as part of security solution prevent the SOA attacks. …”
    Get full text
    Get full text
    Article
  13. 13

    Adaptive security architecture for protecting RESTful web services in enterprise computing environment by Beer, M.I., Hassan, M.F.

    Published 2018
    “…A novel security component named â��intelligent security engineâ�� is introduced which learns the possible occurrences of security threats on SOA using artificial neural networks learning algorithms, then it predicts the potential attacks on SOA based on obtained results by the developed theoretical security model, and the written algorithms as part of security solution prevent the SOA attacks. …”
    Get full text
    Get full text
    Article
  14. 14

    Investigating optimal smartphone placement for identifying stairs movement using machine learning by Muhammad Ruhul Amin, Shourov, Husman, Muhammad Afif, Toha, Siti Fauziah, Jasni, Farahiyah

    Published 2023
    “…The data was trained against 6 machine learning algorithms namely Decision Tree, Logistic Regression, Naive Bayes, Random Forest, Neural Networks and KNN. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Application of machine learning and artificial intelligence in detecting SQL injection attacks by Md Sultan, Abu Bakar, Agiliga, Nwabudike Augustine, Osman, Mohd Hafeez Bin, Sharif, Khaironi Yatim

    Published 2024
    “…Datasets of well-known SQL injection attack patterns and AI/ML models intended for cybersecurity anomaly detection are among the resources underexplored, these findings show the potential for boosting detection capabilities by deploying ML and AI-based security solutions, with some algorithms scoring up to an 80 percent success rate in identifying SQL injections. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Adaptive beamforming algorithm based on Simulated Kalman Filter by Kelvin Lazarus, Lazarus

    Published 2017
    “…Zakwan, applies Opposition-Based Learning method to improve the exploration capabilities of SKF algorithm. …”
    Get full text
    Get full text
    Thesis
  17. 17

    New bio-inspired barnacle optimizers based least-square support vector machine for time-series prediction of pandemic outbreaks by Marzia, Ahmed

    Published 2024
    “…Traditional single machine learning models struggle to capture complex temporal patterns, especially considering the influence of vaccination campaigns on confirmed cases, leading to suboptimal predictions. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Extending the decomposition algorithm for support vector machines training by Zaki, N,M., Deris, S., Chin, K.K.

    Published 2003
    “…The Support Vector Machine (SVM) is found to de a capable learning machine. It has the ability to handle difficult pattern recognition tasks such as speech recognition, and has demonstrated reasonable performance. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    APPLICATION OF LINK GRAMMAR IN SEMI-SUPERVISED NAMED ENTITY RECOGNITION FOR ACCIDENT DOMAIN by SARI, YUNITA SARI

    Published 2011
    “…For the third contribution, we have applied the Self-Training algorithm which is one of the semi-supervised machines learning technique. …”
    Get full text
    Get full text
    Thesis
  20. 20