Search Results - (( using vectorisation using algorithm ) OR ( basic orientation learning algorithm ))

  • Showing 1 - 9 results of 9
Refine Results
  1. 1

    3D silhouette rendering algorithms using vectorisation technique from Kedah topography map by Che Mat, Ruzinoor, Nordin, Norani

    Published 2004
    “…The vectorisation software has been used for producing these data. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2
  3. 3

    An Automated System For Classifying Conference Papers by Ngan, Seon Choon Han

    Published 2021
    “…The Knowledge Discovery in Databases (KDD) process was followed as a formal data mining methodology where 1000 AI conference papers were carefully collected, pre-processed and transformed to numerical representations through TF-IDF vectorisation. A randomised stratified 5- fold cross validation was then applied on several data mining algorithms and evaluated using the F-measure as a metric. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  4. 4
  5. 5

    Adaptive security architecture for protecting RESTful web services in enterprise computing environment by Beer, M.I., Hassan, M.F.

    Published 2018
    “…The proposed security architecture is constructed as an adaptive way-forward Internet-of-Things (IoT) friendly security solution that is comprised of three cyclic parts: learn, predict and prevent. A novel security component named â��intelligent security engineâ�� is introduced which learns the possible occurrences of security threats on SOA using artificial neural networks learning algorithms, then it predicts the potential attacks on SOA based on obtained results by the developed theoretical security model, and the written algorithms as part of security solution prevent the SOA attacks. …”
    Get full text
    Get full text
    Article
  6. 6

    Adaptive security architecture for protecting RESTful web services in enterprise computing environment by Beer, M.I., Hassan, M.F.

    Published 2018
    “…The proposed security architecture is constructed as an adaptive way-forward Internet-of-Things (IoT) friendly security solution that is comprised of three cyclic parts: learn, predict and prevent. A novel security component named â��intelligent security engineâ�� is introduced which learns the possible occurrences of security threats on SOA using artificial neural networks learning algorithms, then it predicts the potential attacks on SOA based on obtained results by the developed theoretical security model, and the written algorithms as part of security solution prevent the SOA attacks. …”
    Get full text
    Get full text
    Article
  7. 7

    Computerized simulation system for ECM radar system by Salleh, Mohamad Sabri

    Published 2007
    “…The principle of electromagnetic spectrum is the basic background for all calculation and simulation. …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    Raspberry Pi-Based Finger Vein Recognition System Using PCANet by Quek, Ee Wen

    Published 2018
    “…For classification, k-Nearest Neighbours (kNN) with Euclidean distance algorithm is implemented. An enhancement version for kNN algorithm, k-General Nearest Neighbours (kGNN) have been proposed at initial stage. …”
    Get full text
    Get full text
    Monograph
  9. 9

    Sensorless induction motor speed control for electric vehicles using enhanced hybrid flux estimator with ann-ifoc controller by Sepeeh, Muhamad Syazmie

    Published 2022
    “…The function of the ANN was to improve speed-tracking performance, and the learning rate of the ANN inside the indirect FOC’s structure trained using the Levenberg-Marquardt (LM) algorithm was varied in order to increase speed-tracking accuracy when combined with the improved ANN speed controller. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis