Search Results - (( variable activation function algorithm ) OR ( java applications from algorithm ))
Search alternatives:
- function algorithm »
- java applications »
- applications from »
- from algorithm »
- variable »
- activation »
-
1
-
2
-
3
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
4
Real-Time Video Processing Using Native Programming on Android Platform
Published 2012“…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
Data-Driven Approach to Modeling Biohydrogen Production from Biodiesel Production Waste: Effect of Activation Functions on Model Configurations
Published 2022“…The RBFNN model with softmax as the hidden layer activation function and identity as the outer layer activation function has the least predictive performance, as indicated by an R2 of 0.403 and a RMSE of 301.55. …”
Get full text
Get full text
Article -
6
Route Optimization System
Published 2005“…After much research into the many algorithms available, and considering some, including Genetic Algorithm (GA), the author selected Dijkstra's Algorithm (DA). …”
Get full text
Get full text
Final Year Project -
7
Shunt active power filter using hybrid fuzzy-proportional and crisp-integral control algorithms for total harmonic distortion improvement
Published 2016“…Utilization of soft-computing algorithms in the operation of Shunt Active Power Filters (SAPFs) becomes a latest trend. …”
Get full text
Get full text
Thesis -
8
Real time De-mixing system based on LMS adaptive algorithm for blind two source signals separation
Published 2007“…The time variant mixing matrix based on random vector with time variable elements are made. Several simulations obtain optimum results of implemented algorithm. …”
Get full text
Conference or Workshop Item -
9
Network game (Literati) / Chung Mei Kuen
Published 2003“…It should be an interesting, time and value worth topic to research on. By using Java applet, it will give a good interactive response since it does not suffer from the delays or variability of bandwidth associated with network connection. …”
Get full text
Get full text
Thesis -
10
MotionSure: a cloud-based algorithm for detection of injected object in data in motion
Published 2017“…Mostly, the Man In The Middle (MITM) attack happens in this stage by hijacking active session variables, manipulating files and objects. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
11
A novel inertia moment estimation algorithm collaborated with active force control scheme for wheeled mobile robot control in constrained environments
Published 2021“…The estimation is accomplished by calculating the membership function based on the experts’ views in any form (symmetric or non-symmetric) with lowly or highly overlapped linguistic variables. …”
Get full text
Get full text
Get full text
Get full text
Article -
12
A novel inertia moment estimation algorithm collaborated with active force control scheme for wheeled mobile robot control in constrained environments
Published 2021“…The estimation is accomplished by calculating the membership function based on the experts’ views in any form (symmetric or non-symmetric) with lowly or highly overlapped linguistic variables. …”
Get full text
Get full text
Get full text
Get full text
Article -
13
A novel inertia moment estimation algorithm collaborated with active force control scheme for wheeled mobile robot control in constrained environments
Published 2021“…The estimation is accomplished by calculating the membership function based on the experts’ views in any form (symmetric or non-symmetric) with lowly or highly overlapped linguistic variables. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
14
Forecasting hydrological parameters for reservoir system utilizing artificial intelligent models and exploring their influence on operation performance
Published 2019“…The three different optimization algorithms used in this study are the genetic algorithm (GA), particle swarm optimization (PSO) algorithm and shark machine learning algorithm (SMLA). …”
Get full text
Get full text
Article -
15
Process Planning Optimization In Reconfigurable Manufacturing Systems
Published 2008“…The five (5) AADTs include; a variant of the simulated annealing algorithm that implements heuristic knowledge at critical decision points, two (2) cooperative search schemes based on a “loose hybridization” of the Boltzmann Machine algorithm with (i) simulated annealing, and (ii) genetic algorithm search techniques, and two (2) modified genetic algorithms. …”
Get full text
Get full text
Thesis -
16
Application-Programming Interface (API) for Song Recognition Systems
Published 2024“…In addition the implementation is done by algorithm using Java’s programming language, executed through an application developed in the Android operating system. …”
Article -
17
An approach for cross-site scripting detection and removal based on genetic algorithms.
Published 2014“…However, the problem of cross-site scripting vulnerabilities present in web applications still persists. In this paper, we propose to explore an approach based on genetic algorithms that will be able to detect and remove cross-site scripting vulnerabilities from the source code before an application is deployed. …”
Get full text
Get full text
Conference or Workshop Item -
18
-
19
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
Get full text
Get full text
Get full text
Article -
20
Analysis of boiler operational variables prior to tube leakage fault by artificial intelligent system
Published 2014“…The results showed that the NN with two hidden layers performed better than one hidden layer using Levenberg-Maquardt training algorithm. Moreover, it was noticed that hyperbolic tangent function for input and output nodes performed better than other activation function types. …”
Get full text
Get full text
Conference or Workshop Item
