Search Results - (( structures learning normalization algorithm ) OR ( java application during algorithm ))
Search alternatives:
- normalization algorithm »
- learning normalization »
- structures learning »
- application during »
- java application »
- during algorithm »
-
1
Optimization of neural network architecture using genetic algorithm for load forecasting
Published 2014“…The network structures are normally selected on the basis of the developer's prior knowledge or hit and trial approach is used for this purpose. …”
Get full text
Get full text
Conference or Workshop Item -
2
Detection on ambiguous software requirements specification written in malay using machine learning
Published 2017“…Four (4) algorithms have been evaluated to find the suitable classification algorithm for this purpose. …”
Get full text
Get full text
Get full text
Thesis -
3
SUDOKU HELPER
Published 2015“…In this paper research, author presents an algorithm to provide a tutorial for any Sudoku player who got stuck during the solving process. …”
Get full text
Get full text
Final Year Project -
4
Adaptive unified neural network for dynamic power quality compensation
Published 2013“…Moreover, an adaptive learning rule is applied on the neural network algorithm to enhance the system speed in detecting voltage sag magnitude and phase. …”
Get full text
Get full text
Conference or Workshop Item -
5
Hybrid multilayered perceptron network for classification of bundle branch blocks
Published 2012Get full text
Working Paper -
6
Investigating the reliability of machine learning algorithms as an advanced tool for ozone concentration prediction
Published 2023“…The hybrid technique has been developed by using deep learning algorithms with the structure of multiple layers (with several neurons) of CNN and LSTM. …”
text::Thesis -
7
Development of a diversified ensemble data summarization (DDS) tool for learning medical data in a multi relational environment
Published 2012“…The proposed algorithm is called a diversified data summarization ensemble method. …”
Get full text
Get full text
Research Report -
8
Talkout : Protecting mental health application with a lightweight message encryption
Published 2022“…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
Get full text
Get full text
Get full text
Academic Exercise -
9
-
10
Adaptive Neural Subtractive Clustering Fuzzy Inference System for the Detection of High Impedance Fault on Distribution Power System
Published 2012“…It is integrating the learning capabilities of neural network to the fuzzy logic system robustness in the sense that fuzzy logic concepts are embedded in the network structure. …”
Get full text
Get full text
Get full text
Article -
11
Ump Intelligent Chatbot Using Dialogflow
Published 2022“…To create such a chatbot, a machine learning algorithm is used to learn the human language that is mainly used during such conversations. …”
Get full text
Get full text
Undergraduates Project Papers -
12
Dynamics and control of underactuated systems with applications in robotics / Ahmad Azlan Mat Isa … [et al.]
Published 2011“…An adaptive learning algorithm using an artificial neural network ANN has been utilized to predict the passive joint position of underactuated robot manipulator. …”
Get full text
Get full text
Research Reports -
13
-
14
Comparative Analysis of Cervical Cell Classification Using Machine Learning Algorithms
Published 2026journal::journal article -
15
-
16
Detection of Denial of Service Attacks against Domain Name System Using Neural Networks
Published 2009“…In the current research for our machine learning engine, we aimed to find the optimum machine learning algorithm to be used as an IDS. …”
Get full text
Get full text
Thesis -
17
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis -
18
An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications
Published 2015“…This research work was limited to Java based web applications. In future research, the method can be extended to include other programming languages as well as other similar web application security vulnerabilities.…”
Get full text
Get full text
Thesis -
19
Nomadic people optimizer (NPO) for large-scale optimization problems
Published 2019“…A metaheuristic is defined as an iterative generation process which guides a subordinate heuristic through a combination of different intelligent concepts for exploring and exploiting the solution space; they employ learning strategies to structure information in order to establish efficient near-optimal solutions. …”
Get full text
Get full text
Thesis -
20
Development of electromyography-controlled 3D printed robot hand and supervised machine learning for signal classification
Published 2019“…The current state of the robot hand structure development, the structure features do not resemble the human hand functionality with less durability and poor movement capability. …”
Get full text
Get full text
Thesis
