Search Results - (( process identification learning algorithm ) OR ( java application learning algorithm ))
Search alternatives:
- identification learning »
- process identification »
- application learning »
- learning algorithm »
- java application »
-
1
A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment
Published 2013“…The assessment of quality attributes has been improved using FRA algorithm enriched with a formula to calculate the priority of attributes and followed by learning adaptation through Java Library for Multi Label Learning (MULAN) application. …”
Get full text
Get full text
Get full text
Thesis -
2
-
3
Adaptive Linear System Identification over Simulated Wireless Environment
Published 2009“…The work looks thoroughly on three forms of instantaneous learning algorithms which are: first order algorithms (e.g. least mean square (LMS)), second order algorithms (e.g. …”
Get full text
Get full text
Thesis -
4
RECURSIVE LEARNING ALGORITHMS ON RBF NETWORKS FOR NONLINEAR SYSTEM IDENTIFICATION
Published 2010“…The learning method will determine the performance’s capability of the networks for the system identification process which will be one of the key issues to be discussed in the thesis. …”
Get full text
Get full text
Get full text
Thesis -
5
Date store management in sliding window based on-line identification algorithms
Published 2001“…Sliding window identification algorithms use information from a store of data to optimise on-line learning. …”
Get full text
Get full text
Conference or Workshop Item -
6
Identification and control of a small-scale helicopter
Published 2010“…This identification process is based on the well-known gradient descent learning algorithm. …”
Get full text
Article -
7
Opposition- based simulated kalman filters and their application in system identification
Published 2017“…From literature, Opposition-based Learning (OBL) has been employed to increase the diversity (exploration) of search algorithm by allowing current population to be compared with an opposite population. …”
Get full text
Get full text
Thesis -
8
Privacy Preserving Features Selection for Data Mining using Machine Learning Algorithms
Published 2023Conference Paper -
9
Identification model for hearing loss symptoms using machine learning techniques
Published 2014“…This research presents an efficient way to facilitate the hearing loss symptoms diagnosis process by designing a symptoms identification model that efficiently identify hearing loss symptoms based on air and bone conduction pure-tone audiometry data. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
10
-
11
-
12
A review on object detection algorithms based deep learning methods / Wan Xing ... [et al.]
Published 2023“…Deep learning-based object detection algorithms can be categorized into three main types: end-to-end algorithms, two-stage algorithms, and one-stage algorithms. …”
Get full text
Get full text
Article -
13
Arabic Speaker Identification System for Forensic Authentication Using K-NN Algorithm
Published 2023Conference Paper -
14
-
15
An Educational Tool Aimed at Learning Metaheuristics
Published 2020“…In this paper, we introduce an education tool for learning metaheuristic algorithms that allows displaying the convergence speed of the corresponding metaheuristic upon setting/changing the dependable parameters. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
16
SLIDING WINDOW TRAINING ALGORITHMS USING MLP-NETWORK FOR CORRELATED AND LOST PACKET DATA
Published 2012“…This thesis gives a systematic investigation of various MLP learning mainly Sliding Window (SW) learning mode which is treated as the adaptation of offline algorithms into online application Consequently this thesis reviews various offline algorithms including: batch backpropagation, nonlinear conjugate gradient, limited memory and full-memory Broyden, Fletcher, Goldfarb and Shanno algorithms and different forms of the latest proposed bimary ensemble learning. …”
Get full text
Get full text
Thesis -
17
Improved intrusion detection algorithm based on TLBO and GA algorithms
Published 2021“…Optimization algorithms are widely used for the identification of intrusion. …”
Get full text
Get full text
Get full text
Article -
18
Identification of tajwid using artificial neural networks / Zunnajah Kamaruddin
Published 2005“…Images are used as samples to be processed for the used of classification. In order to have a system which has an ability to learn, back-propagation learning algorithm is used. …”
Get full text
Get full text
Thesis -
19
Data mining for structural damage identification using hybrid artificial neural network based algorithm for beam and slab girder / Meisam Gordan
Published 2020“…It was also concluded that the ICA could successfully improve the learning process of the neural network. Therefore, the obtained results through the proposed DM procedure using ANN-ICA (1) confirmed the robustness of the hybrid network in compare to the pre-developed network, and (2) indicated that, the proposed damage identification model can be considered as a precise approach for monitoring the structural condition subjected to vibrational loads. …”
Get full text
Get full text
Get full text
Thesis -
20
Classification of Citrus (Rutaceae) by Using Image Processing
Published 2019“…A machine learning algorithms, SVM have been used to build species identification models. …”
Get full text
Get full text
Undergraduate Final Project Report
