Search Results - (( variable activation function algorithm ) OR ( _ segmentation mining algorithm ))
Search alternatives:
- segmentation mining »
- function algorithm »
- mining algorithm »
- variable »
- activation »
-
1
Image clustering comparison of two color segmentation techniques
Published 2010“…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
2
Development of a new algorithm for segmentation of flotation froth images
Published 2014Get full text
Get full text
Article -
3
Finding objects with segmentation strategy based multi robot exploration in unknown environment
Published 2013“…Two algorithms were investigated in this paper one is frontier based random search algorithm and the second is efficient algorithm based on segmentation strategy. …”
Get full text
Get full text
Get full text
Article -
4
The application of neural network data mining algorithm into mixed pixel classification in geographic information system environment
Published 2007“…Region growing segmentation and radial basis function algorithms are considered a powerful tool to minimize the mixed pixel classification error.…”
Get full text
Get full text
Conference or Workshop Item -
5
Framework for stream clustering of trajectories based on temporal micro clustering technique
Published 2018“…On the other hand, trajectories preprocessing such as segmentation and noise points filtering is a vital step which precedes the mining task. …”
Get full text
Get full text
Thesis -
6
-
7
Denoising histological images for a better colour image segmentation / Sulastri Putit
Published 2013“…In this study, the de-noising concept for colour image preprocessing and segmentation are proposed since these two processes has been widely accepted as an important component of the image mining in order to enhance the images.…”
Get full text
Get full text
Thesis -
8
Analysis Of Failure In Offline English Alphabet Recognition With Data Mining Approach
Published 2019“…However, these approaches involve complex algorithms and require voluminous dataset as the training model. …”
Get full text
Get full text
Monograph -
9
Intuitive Content Management System to Preferences Template Throughout Data Collection by using Data Mining Classification of Prediction Method
Published 2016“…The sophisticated mathematical algorithm applies in data mining to segment data and evaluates the probability of a future event. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
10
Data-Driven Approach to Modeling Biohydrogen Production from Biodiesel Production Waste: Effect of Activation Functions on Model Configurations
Published 2022“…The RBFNN model with softmax as the hidden layer activation function and identity as the outer layer activation function has the least predictive performance, as indicated by an R2 of 0.403 and a RMSE of 301.55. …”
Get full text
Get full text
Article -
11
Data mining and analysis for predicting electrical energy consumption
Published 2024“…This classification was done using data mining (five algorithms in specific) and data analysis theory. …”
Article -
12
Shunt active power filter using hybrid fuzzy-proportional and crisp-integral control algorithms for total harmonic distortion improvement
Published 2016“…Utilization of soft-computing algorithms in the operation of Shunt Active Power Filters (SAPFs) becomes a latest trend. …”
Get full text
Get full text
Thesis -
13
Improvement on rooftop classification of worldview-3 imagery using object-based image analysis
Published 2019“…Then, the classifier (support vector machine (SVM) and data mining (DM) algorithm, decision tree (DT) were applied on each fusion image and their accuracy were evaluated. …”
Get full text
Get full text
Thesis -
14
-
15
A detailed description on unsupervised heterogeneous anomaly based intrusion detection framework
Published 2019“…More effort has been taken in utilizing the data mining and machine learning algorithms to construct anomaly based intrusion detection systems, but the dependency on the learned models that were built based on earlier network behaviour still exists, which restricts those methods in detecting new or unknown intrusions. …”
Get full text
Get full text
Get full text
Article -
16
Real time De-mixing system based on LMS adaptive algorithm for blind two source signals separation
Published 2007“…The time variant mixing matrix based on random vector with time variable elements are made. Several simulations obtain optimum results of implemented algorithm. …”
Get full text
Conference or Workshop Item -
17
MotionSure: a cloud-based algorithm for detection of injected object in data in motion
Published 2017“…Mostly, the Man In The Middle (MITM) attack happens in this stage by hijacking active session variables, manipulating files and objects. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
18
-
19
A novel inertia moment estimation algorithm collaborated with active force control scheme for wheeled mobile robot control in constrained environments
Published 2021“…The estimation is accomplished by calculating the membership function based on the experts’ views in any form (symmetric or non-symmetric) with lowly or highly overlapped linguistic variables. …”
Get full text
Get full text
Get full text
Get full text
Article -
20
A novel inertia moment estimation algorithm collaborated with active force control scheme for wheeled mobile robot control in constrained environments
Published 2021“…The estimation is accomplished by calculating the membership function based on the experts’ views in any form (symmetric or non-symmetric) with lowly or highly overlapped linguistic variables. …”
Get full text
Get full text
Get full text
Get full text
Article
