Search Results - (( using normalization based algorithm ) OR ( using vectorization learning algorithm ))

Refine Results
  1. 1

    Sauvola Segmentation and Support Vector Machine-Salp Swarm Algorithm Approach for Identifying Nutrient Deficiencies in Citrus Reticulata Leaves by Lia, Kamelia

    Published 2024
    “…The proposed method integrates colour and texture feature-based image analysis with machine learning algorithms for classification. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    Forensic language of property theft genre based on mathematical formulae and machine learning algorithms / Hana' Abd Razak by Abd Razak, Hana'

    Published 2020
    “…Towards achieving better detection in real-time environment, colour pixel-based images were trained on five pre-trained CNNs using transfer learning algorithm. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    CAT CHAOTIC GENETIC ALGORITHM BASED TECHNIQUE AND HARDWARE PROTOTYPE FOR SHORT TERM ELECTRICAL LOAD FORECASTING by ISLAM, BADAR UL ISLAM

    Published 2017
    “…The solution set (i.e. optimized weight/bias matrix of ANN) provided by the optimized and improved genetic algorithm and modified BP based model is extracted and used in the design and development of a prototype device of the proposed model. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Simultaneous fault diagnosis based on multiple kernel support vector machine in nonlinear dynamic distillation column by Taqvi, S.A.A., Zabiri, H., Uddin, F., Naqvi, M., Tufa, L.D., Kazmi, M., Rubab, S., Naqvi, S.R., Maulud, A.S.

    Published 2022
    “…Dynamic simulation of a pilot-scale distillation column using Aspen Plus® is used for generating data in normal and faulty operation. …”
    Get full text
    Get full text
    Article
  6. 6

    Machine Learning in Asphaltenes Mitigation by Qasim, A., Lal, B.

    Published 2023
    “…The machine and deep learning methods included Bayesian belief network (BBN), Least-squares support vector machine (LSSVM), Support vector regression (SVR) and Genetic algorithm-support vector regression (GA-SVR). …”
    Get full text
    Get full text
    Book
  7. 7

    Forecasting and Trading of the Stable Cryptocurrencies With Machine Learning and Deep Learning Algorithms for Market Conditions by Shamshad, H., Ullah, F., Ullah, A., Kebande, V.R., Ullah, S., Al-Dhaqm, A.

    Published 2023
    “…Thus, this proposed system employs a data science-based framework and six highly advanced data-driven Machine learning and Deep learning algorithms: Support Vector Regressor, Auto-Regressive Integrated Moving Average (ARIMA), Facebook Prophet, Unidirectional LSTM, Bidirectional LSTM, Stacked LSTM. …”
    Get full text
    Get full text
    Article
  8. 8

    A review of classification techniques for electromyography signals by Mohd Saad, Norhashimah, Omar, Siti Nashayu, Abdullah, Abdul Rahim, Shair, Ezreen Farina, H.Rashid

    Published 2023
    “…This article depicts the application of various ML algorithms used in EMG signal analysis till recently, but in the future, it will be used in more medical fields to improve the quality of diagnosis.…”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Performance evaluation of intrusion detection system using selected features and machine learning classifiers by Raja Mahmood, Raja Azlina, Abdi, AmirHossien, Hussin, Masnida

    Published 2021
    “…In this study, two different sets of selected features have been adopted to train four machine-learning based classifiers. The two sets of selected features are based on Genetic Algorithm (GA) and Particle Swarm Optimization (PSO) approach respectively. …”
    Get full text
    Get full text
    Article
  10. 10

    Neural network paradigm for classification of defects on PCB by Heriansyah, Rudi, Syed Al-Attas, Syed Abdul Rahman, Zabidi, Muhammad Mun'im Ahmad

    Published 2003
    “…A new technique is proposed to classify the defects that could occur on the PCB using neural network paradigm. The algorithms to segment the image into basic primitive patterns, enclosing the primitive patterns, patterns assignment, patterns normalization, and classification have been developed based on binary morphological image processing and Learning Vector Quantization (LVQ) neural network. …”
    Get full text
    Get full text
    Article
  11. 11

    ICS cyber attack detection with ensemble machine learning and DPI using cyber-Kit datasets by Mubarak, Sinil, Habaebi, Mohamed Hadi, Islam, Md. Rafiqul, Khan, Sheroz

    Published 2021
    “…The processed metadata is normalized for the easiness of algorithm analysis and modelled with machine learning-based latest deep learning ensemble LSTM algorithms for anomaly detection. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  12. 12

    Investigating the reliability of machine learning algorithms as an advanced tool for ozone concentration prediction by Ayman Mohammed Shaher Yafouz, Mr.

    Published 2023
    “…The hybrid technique has been developed by using deep learning algorithms with the structure of multiple layers (with several neurons) of CNN and LSTM. …”
    text::Thesis
  13. 13
  14. 14

    Machine Learning based Predictive Modelling of Cybersecurity Threats Utilising Behavioural Data by Ting, Tin Tin, Khiew, Jie Xin, Ali Aitizaz, Lee, Kuok Tiung, Teoh, Chong Keat, Hasan Sarwar

    Published 2023
    “…The algorithms are used to construct, test, and validate three categories of cybercrime threat (Malware, Social Engineering, and Password Attack) predictive models. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  15. 15
  16. 16

    Deep learning-based breast cancer detection and classification using histopathology images / Ghulam Murtaza by Ghulam , Murtaza

    Published 2021
    “…For BrC detection, an efficient and reliable model namely Ensemble BrC Detection Network (EBrC-Net) and three misclassification reduction (McR) algorithms are developed. The proposed EBrC-Net model is based on deep learning (DL) based approach. …”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    Prediction of breast cancer diagnosis using machine learning in Malaysian women by Mokhtar, Tengku Muhammad Hanis Tengku

    Published 2024
    “…This project found that there was a strong interest in the application of ML to breast cancer in the last three decades. The three frequently used ML algorithms were deep learning, support vector machine (SVM), and cluster analysis. …”
    Get full text
    Get full text
    Thesis
  18. 18

    An Improved Diabetes Risk Prediction Framework : An Indonesian Case Study by Sutanto, Daniel Hartono

    Published 2018
    “…Pre-processing resolves the issue of missing data and hence normalizes the data.Outlier treatment employs k-mean clustering to validate the class.Suitable components were selected through comparison of classifier algorithms and feature selection.Attribute weighting based feature selection was selected for assigning weightage.Weighted risk factor was used on training dataset in order to improve accuracy and computation time of the prediction. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    Risk prediction analysis for classifying type 2 diabetes occurrence using local dataset by Abd Rahman, M. Hafiz Fazren, Wan Salim, Wan Wardatul Amani, Abd-Wahab, Firdaus

    Published 2020
    “…This research aims to develop a robust prediction model for classification of type 2 diabetes mellitus (T2DM), with the interest of a Malaysian population, using several well-known machine learning algorithm such as Decision Tree, Support Vector Machine and Naïve Bayers. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    An improved hybrid learning approach for better anomaly detection by Mohamed Yassin, Warusia

    Published 2011
    “…Probe, U2R and R2L attack data grouped into C1, while C2 is used to group DoS attack data. In order to separates normal data from an attack, C3 is used. …”
    Get full text
    Get full text
    Thesis