Search Results - (( java solution machine algorithm ) OR ( program estimation learning algorithm ))

Search alternatives:

Refine Results
  1. 1
  2. 2
  3. 3

    System identification using Extended Kalman Filter by Alias, Ahmad Hafizi

    Published 2017
    “…The EKF algorithm performance was compared with Recursive Least Square (RLS) estimation algorithm as a comparison algorithm performance. …”
    Get full text
    Get full text
    Student Project
  4. 4
  5. 5

    Network monopoly / Tan Kean Yeap by Tan , Kean Yeap

    Published 2002
    “…With the powerful networking features of Java, it is expected that this project would produce a "real" game engine. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Development of open platform controller for step-NC compliant CNC system by Chi Adam, Mohd Khairil Anbia

    Published 2020
    “…Therefore, this study covers the system which has been designed and developed from outdated and conventional PROLIGHT 1000 Milling CNC machine from Light Intelitek as the lesser cost solution which further discussed in detail based upon upgrades of hardware, architecture, and algorithm design. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Long-term electrical energy consumption: Formulating and forecasting via optimized gene expression programming / Seyed Hamidreza Aghay Kaboli by Seyed Hamidreza , Aghay Kaboli

    Published 2018
    “…This merit is provided by balancing the exploitation of solution structure and exploration of its appropriate weighting factors through use of a robust and efficient optimization algorithm in learning process of GEP approach. To assess the applicability and accuracy of the proposed method for long-term electrical energy consumption, its estimates are compared with those obtained from artificial neural network (ANN), support vector regression (SVR), adaptive neuro-fuzzy inference system (ANFIS), rule-based data mining algorithm, GEP, linear, quadratic and exponential models optimized by particle swarm optimization (PSO), cuckoo search algorithm (CSA), artificial cooperative search (ACS) algorithm and backtracking search algorithm (BSA). …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    Deep Reinforcement Learning For Control by Bakar, Nurul Asyikin Abu

    Published 2021
    “…To generate the visual simulation in the simulator, the Python programming language is employed. The improved algorithm will help encourage the real-world implementation of DRL in many autonomous driving applications.…”
    Get full text
    Get full text
    Monograph
  9. 9
  10. 10
  11. 11
  12. 12

    Validation of deep convolutional neural network for age estimation in children using mandibular premolars on digital panoramic dental imaging / Norhasmira Mohammad by Mohammad, Norhasmira

    Published 2022
    “…The semi-automated dental staging system developed in this study is based on the Malay children’s population and uses a brain-inspired learning algorithm termed "deep learning". The methodology is comprised of four major steps: image preprocessing, which adheres to the inclusion criteria for panoramic dental radiographs, segmentation, and classification of mandibular premolars according to Demirjian's staging system using the Dynamic Programming-Active Contour (DP-AC) method and Deep Convolutional Neural Network (DCNN), respectively, and statistical analysis. …”
    Get full text
    Get full text
    Thesis
  13. 13

    The implications for ahybrid detection technique against malicious sqlattacks on web applications by Bahjat Arif, Sarajaldeen Akram, Wani, Sharyar

    Published 2025
    “…The outcome of this study will add to the body of knowledge the most important and recent proposed solutions to mitigate SQL injection attack, in particular those based on machine learning algorithm…”
    Get full text
    Get full text
    Get full text
    Article
  14. 14
  15. 15

    Speed control of separately excited dc motor using artificial intelligent approach by Bernard, Albinus

    Published 2013
    “…A neural network controller with learning technique based on back propagation algorithm is developed. …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    Development of a software for simulating active force control schemes of a two-link planar manipulator by Mailah, Musa, Poh, Yang Liang

    Published 2005
    “…On Top Of That, The Graphical Results Can Be Observed And Analysed On-Line While The Program Is Running. By Using Matlab And Its Gui Facility, All The AFC Schemes Already Described In The Previous Works Such As The AFC With Crude Approximation Method, AFC And Iterative Learning (Afcail), AFC And Neural Network (Afcann), AFC And Fuzzy Logic (Afcafl), And AFC And Genetic Algorithm (Afcaga) Schemes Were Linked Into A Single Menu-Driven Program Where Each Of The Scheme Can Be Easily Selected And Executed By The User. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17
  18. 18

    Development of a software for simulating active force control schemes of a two–link planar manipulator by Mailah, Musa, Poh, Yang Liang

    Published 2005
    “…On top of that, the graphical results can be observed and analysed on–line while the program is running. By using MATLAB and its GUI facility, all the AFC schemes already described in the previous works such as the AFC with crude approximation method, AFC and Iterative Learning (AFCAIL), AFC and Neural Network (AFCANN), AFC and Fuzzy Logic (AFCAFL), and AFC and Genetic Algorithm (AFCAGA) schemes were linked into a single menu–driven program where each of the scheme can be easily selected and executed by the user. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC by Ismail, Haqi Khalid

    Published 2021
    “…The offline scheme utilizes a Time-based One-Time Password (TOTP) algorithm to allow users to authenticate to the vehicle without needing an Internet connection once they have registered online when Internet access is available. …”
    Get full text
    Get full text
    Thesis
  20. 20