Search Results - (( using function search algorithm ) OR ( image classification problems algorithm ))
Search alternatives:
- image classification »
- function search »
- using function »
- problems »
-
1
RMIL/AG: A new class of nonlinear conjugate gradient for training back propagation algorithm
Published 2018“…This paper introduced a new class of efficient second order conjugate gradient (CG) for training BP called Rivaie, Mustafa, Ismail and Leong (RMIL)/AG. The RMIL uses the value of adaptive gain parameter in the activation function to modify the gradient based search direction. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
2
Hybrid conjugate gradient using exact line search in photovoltaic system / Muhammad Ariiq Iqbaal Azizul Firdaus
Published 2025“…At last, PRPLS is implemented in photovoltaic system, specifically in the maximum power point tracking (MPPT) algorithm. This study shows the effectiveness of PRPLS in solving problem of maximizing the power output generated by the photovoltaic system.…”
Get full text
Get full text
Thesis -
3
Secure Access To Authorized Resources Based On Fingerprint Authentication
Published 2003“…Passwords are frequently used to control access to restricted functions. …”
Get full text
Get full text
Thesis -
4
An improved defect classification algorithm for six printing defects and its implementation on real printed circuit board images
Published 2012“…The defect classification algorithm is improved by incorporating proper image registration and thresholding techniques to solve the alignment and uneven illumination problem. …”
Get full text
Get full text
Get full text
Article -
5
Gravitational search – bat algorithm for solving single and bi-objective of non-linear functions
Published 2018“…The second technique is to solve bi-objective functions by using the BOBAT algorithm. The third technique is an integration of BOGSA with BOBAT to produce a BOGSBAT algorithm. …”
Get full text
Get full text
Thesis -
6
Supervised ANN classification for engineering machined textures based on enhanced features extraction and reduction scheme
Published 2013“…Some of the main problems of image classification are the poor features that does not precisely represent an image, and the large dimensionality of data input passed to classifiers. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
7
Protein Conformantional Search Using Bees Algorithm
Published 2008“…To this end, an energy function is used to calculate its energy and a conformational search algorithm is used to search the conformational search space to find the lowest free energy corformation.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
8
Classification model for water quality using machine learning techniques
Published 2015Get full text
Get full text
Article -
9
Extremal region detection and selection with fuzzy encoding for food recognition
Published 2019“…The first algorithm locates interest points in food images using an MSER. …”
Get full text
Get full text
Thesis -
10
Optimization of modified Bouc–Wen model for magnetorheological damper using modified cuckoo search algorithm
Published 2021“…The newly proposed algorithm was tested using a set of standard benchmark functions with different searching space and global optima placement. …”
Get full text
Get full text
Get full text
Article -
11
RLMD-PA: A Reinforcement Learning-Based Myocarditis Diagnosis Combined with a Population-Based Algorithm for Pretraining Weights
Published 2024journal::journal article -
12
Edge detection and contour segmentation for fruit classification in natural environment / Khairul Adilah Ahmad
Published 2018“…In general, image segmentation isolates an object from the images, feature extraction creates features for classification phase while object classification categorizes objects into the correct groups. …”
Get full text
Get full text
Thesis -
13
Enhancing the cuckoo search with levy flight through population estimation
Published 2016“…The algorithm is tested on five benchmark functions such as Ackley function, Griewank function, Rastrigin function, Rosenbrock function and Schwefel function. …”
Get full text
Get full text
Article -
14
Enhancing harmony search parameters based on step and linear function for bus driver scheduling and rostering problems
Published 2018“…Therefore,it is of great interest that we find adjustments for these parameters in this research.There are two contributions to this research.The first one is having HMCR parameter using step function and the linear increase function while the second is applying the fret spacing concept on guitars that is associated with mathematical formulae is also applied in the BW parameter.There are three proposed models on the alteration of HMCR parameters based on the use of the fundamental step function;namely,the constant interval of step function, and its dynamic increase and decrease interval functions.The experimental results revealed that our proposed approach is superior to other state of the art harmony searches either in specific or generic cases. …”
Get full text
Get full text
Get full text
Thesis -
15
UNSUPERVISED SEGMENTATION OF CORAL REEF IMAGES BY USING COLOR AND TEXTURE FEATURES
Published 2022“…This thesis proposed a modified JSEG algorithm to solve the problem of over segmentation when applying it to underwater coral reef images.…”
Get full text
Thesis -
16
Assessing the symbiotic organism search variants using standard benchmark functions
Published 2019“…Symbiotic Organism Search (SOS) is one of the latest meta-heuristic algorithms created to solve optimization problems. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
17
Ringed seal search for global optimization via a sensitive search model / Younes Saadi
Published 2018“…The quality of the algorithm is comprehensively evaluated on various standard benchmark test functions using variety of quality metrics and using three baseline algorithms for comparison. …”
Get full text
Get full text
Get full text
Thesis -
18
-
19
Image authentication using Zernike moment watermarking
Published 2013“…The adding or replacing a portion of the image is regarded as malicious attacks and rejected by this algorithm. …”
Get full text
Get full text
Thesis -
20
