Search Results - (( pattern detection models algorithm ) OR ( parameter optimization based algorithm ))
Search alternatives:
- parameter optimization »
- pattern detection »
- detection models »
- models algorithm »
-
1
Heart disease prediction using artificial neural network with ADAM optimization and harmony search algorithm
Published 2025“…The ADAM optimizer effectively tackles challenges in continuous parameter optimization by dynamically updating the model's weights and biases, adapting the learning rate for each parameter based on accumulated historical gradient information to achieve more efficient minimization of the loss function during training. …”
Get full text
Get full text
Get full text
Article -
2
-
3
Optimize and deploy machine learning algorithms on embedded devices for manufacturing applications
Published 2025“…On the other hand, network compression and acceleration techniques such as pruning and quantization also been the focus of the studies for light-weight algorithms in embedded system. While in our studies, we primarily focusing on the deployment and fine-tuning of deep learning model which is YOLOv5 for PCB defects detection. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
4
A new model for iris data set classification based on linear support vector machine parameter's optimization
Published 2020“…Data mining is known as the process of detection concerning patterns from essential amounts of data. …”
Get full text
Get full text
Get full text
Article -
5
Classification of diabetic retinopathy clinical features using image enhancement technique and convolutional neural network / Abdul Hafiz Abu Samah
Published 2021“…Based on investigation different architecture and parameter, the suitable deep learning model has been presented to get optimize best result and testing time. …”
Get full text
Get full text
Thesis -
6
Modeling, Testing and Experimental Validation of Laser Machining Micro Quality Response by Artificial Neural Network
Published 2009“…Ten different architectures and models were tested and finally the best 3-8-1 model was finalized based on R square values. …”
Get full text
Get full text
Article -
7
Image watermarking optimization algorithms in transform domains and feature regions
Published 2012“…A series of training patterns are constructed by employing between two images.Moreover,the work takes accomplishing maximum robustness and transparency into consideration.HPSO method is used to estimate the multiple parameters involved in the model. …”
Get full text
Get full text
Thesis -
8
Landslide susceptibility mapping using decision-tree based chi-squared automatic interaction detection (CHAID) and logistic regression (LR) integration
Published 2014“…LR model was used to find the corresponding coefficients of best fitting function that assess the optimal terminal nodes. …”
Get full text
Get full text
Conference or Workshop Item -
9
Robust tweets classification using arithmetic optimization with deep learning for sustainable urban living
Published 2024“…In this view, this research develops an arithmetic optimization algorithm with deep learning based tweets classification (AOADL-TC) approach for sustainable living. …”
Get full text
Get full text
Get full text
Get full text
Article -
10
Robust techniques for linear regression with multicollinearity and outliers
Published 2016“…The ordinary least squares (OLS) method is the most commonly used method in multiple linear regression model due to its optimal properties and ease of computation. …”
Get full text
Get full text
Thesis -
11
Model predictive control based on Lyapunov function and near state vector selection of four-leg inverter / Abdul Mannan Dadu
Published 2018“…The proposed control algorithm takes advantage of a predefined Lyapunov control law which minimizes the required calculation time by the Lyapunov model equations just once in each control loop to predict future variables. …”
Get full text
Get full text
Get full text
Thesis -
12
Algorithm enhancement for host-based intrusion detection system using discriminant analysis
Published 2004“…Misuse detection algorithms model know attack behavior. They compare sensor data to attack patterns learned from the training data. …”
Get full text
Get full text
Thesis -
13
Integrated optimal control and parameter estimation algorithms for discrete-time nonlinear stochastic dynamical systems
Published 2011“…The main idea is the integration of optimal control and parameter estimation. In this work, a simplified model-based optimal control model with adjustable parameters is constructed. …”
Get full text
Get full text
Thesis -
14
-
15
On Adopting Parameter Free Optimization Algorithms for Combinatorial Interaction Testing
Published 2015“…In doing so, this paper reviews two existing parameter free optimization algorithms involving Teaching Learning Based Optimization (TLBO) and Fruitfly Optimization Algorithm (FOA) in an effort to promote their adoption for CIT.…”
Get full text
Get full text
Get full text
Article -
16
Finite impulse response optimizers for solving optimization problems
Published 2019“…Selecting optimal parameters’ values may improve an algorithm’s performance. …”
Get full text
Get full text
Thesis -
17
Finite impulse response optimizers for solving optimization problems
Published 2019“…Selecting optimal parameters’ values may improve an algorithm’s performance. …”
Get full text
Get full text
Thesis -
18
Bat Algorithm for Complex Event Pattern Detection in Sentiment Analysis
Published 2021“…Thus, this study proposed a Bat Algorithm (BA) to address the complex learning structure of DBN in detecting sentiment patterns. …”
Get full text
Get full text
Monograph -
19
A study on advanced statistical analysis for network anomaly detection
Published 2005“…Misuse detection algorithms model know attack behavior. They compare sensor data to attack patterns learned from the training data. …”
Get full text
Monograph -
20
An empirical study of pattern leakage impact during data preprocessing on machine learning-based intrusion detection models reliability
Published 2023“…In this paper, we investigate the impact of pattern leakage during data preprocessing on the reliability of Machine Learning (ML) based intrusion detection systems (IDS). …”
Get full text
Get full text
Article
