Search Results - (( structures learning normalization algorithm ) OR ( java application during algorithm ))

Refine Results
  1. 1

    Optimization of neural network architecture using genetic algorithm for load forecasting by Islam, B.U., Baharudin, Z., Raza, M.Q., Nallagownden, P.

    Published 2014
    “…The network structures are normally selected on the basis of the developer's prior knowledge or hit and trial approach is used for this purpose. …”
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2

    Detection on ambiguous software requirements specification written in malay using machine learning by Zahrin, Mohd Firdaus

    Published 2017
    “…Four (4) algorithms have been evaluated to find the suitable classification algorithm for this purpose. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    SUDOKU HELPER by Abdul Razak, Muhammad Asyraf

    Published 2015
    “…In this paper research, author presents an algorithm to provide a tutorial for any Sudoku player who got stuck during the solving process. …”
    Get full text
    Get full text
    Final Year Project
  4. 4

    Adaptive unified neural network for dynamic power quality compensation by Ghazanfarpour, Behzad, Mohd Radzi, Mohd Amran, Mariun, Norman, Shoorangiz, Reza

    Published 2013
    “…Moreover, an adaptive learning rule is applied on the neural network algorithm to enhance the system speed in detecting voltage sag magnitude and phase. …”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5
  6. 6

    Investigating the reliability of machine learning algorithms as an advanced tool for ozone concentration prediction by Ayman Mohammed Shaher Yafouz, Mr.

    Published 2023
    “…The hybrid technique has been developed by using deep learning algorithms with the structure of multiple layers (with several neurons) of CNN and LSTM. …”
    text::Thesis
  7. 7
  8. 8

    Talkout : Protecting mental health application with a lightweight message encryption by Gavin Teo Juen

    Published 2022
    “…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  9. 9
  10. 10

    Adaptive Neural Subtractive Clustering Fuzzy Inference System for the Detection of High Impedance Fault on Distribution Power System by Tawafan, Adnan, Sulaiman , Marizan, Ibrahim, Zulkifilie

    Published 2012
    “…It is integrating the learning capabilities of neural network to the fuzzy logic system robustness in the sense that fuzzy logic concepts are embedded in the network structure. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Ump Intelligent Chatbot Using Dialogflow by Joachim, Agostain

    Published 2022
    “…To create such a chatbot, a machine learning algorithm is used to learn the human language that is mainly used during such conversations. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  12. 12

    Dynamics and control of underactuated systems with applications in robotics / Ahmad Azlan Mat Isa … [et al.] by Mat Isa, Ahmad Azlan

    Published 2011
    “…An adaptive learning algorithm using an artificial neural network ANN has been utilized to predict the passive joint position of underactuated robot manipulator. …”
    Get full text
    Get full text
    Research Reports
  13. 13
  14. 14
  15. 15
  16. 16

    Detection of Denial of Service Attacks against Domain Name System Using Neural Networks by Rastegari, Samaneh

    Published 2009
    “…In the current research for our machine learning engine, we aimed to find the optimum machine learning algorithm to be used as an IDS. …”
    Get full text
    Get full text
    Thesis
  17. 17

    A malware analysis and detection system for mobile devices / Ali Feizollah by Ali, Feizollah

    Published 2017
    “…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications by Hydara, Isatou

    Published 2015
    “…This research work was limited to Java based web applications. In future research, the method can be extended to include other programming languages as well as other similar web application security vulnerabilities.…”
    Get full text
    Get full text
    Thesis
  19. 19

    Nomadic people optimizer (NPO) for large-scale optimization problems by Mohamd Salih, Sinan Qahtan

    Published 2019
    “…A metaheuristic is defined as an iterative generation process which guides a subordinate heuristic through a combination of different intelligent concepts for exploring and exploiting the solution space; they employ learning strategies to structure information in order to establish efficient near-optimal solutions. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Development of electromyography-controlled 3D printed robot hand and supervised machine learning for signal classification by Abdul Wahit, Mohamad Aizat

    Published 2019
    “…The current state of the robot hand structure development, the structure features do not resemble the human hand functionality with less durability and poor movement capability. …”
    Get full text
    Get full text
    Thesis