Search Results - (( variable activation function algorithm ) OR ( java information access algorithm ))
Search alternatives:
- function algorithm »
- information access »
- java information »
- access algorithm »
- variable »
- activation »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
2
Hybrid cryptography algorithm to improve security cloud storage
Published 2017“…Utilization of a solitary algorithm is not powerful for extra ordinary state security to information in cloud computing. …”
Get full text
Get full text
Get full text
Thesis -
3
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…Therefore, SANAsms system ensures that information (SMS) interchange between sender and receiver is secured and protected because the messages containing delicate information are stored securely and remain undisclosed even when the device is accessed by an adversary. …”
Get full text
Get full text
Conference or Workshop Item -
4
-
5
Data-Driven Approach to Modeling Biohydrogen Production from Biodiesel Production Waste: Effect of Activation Functions on Model Configurations
Published 2022“…The RBFNN model with softmax as the hidden layer activation function and identity as the outer layer activation function has the least predictive performance, as indicated by an R2 of 0.403 and a RMSE of 301.55. …”
Get full text
Get full text
Article -
6
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
7
Shunt active power filter using hybrid fuzzy-proportional and crisp-integral control algorithms for total harmonic distortion improvement
Published 2016“…Utilization of soft-computing algorithms in the operation of Shunt Active Power Filters (SAPFs) becomes a latest trend. …”
Get full text
Get full text
Thesis -
8
-
9
Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption
Published 2022“…The selected lightweight geo-encryption algorithm will be implemented in the proposed system, vi which develops by using Java language. …”
Get full text
Get full text
Get full text
Academic Exercise -
10
Real time De-mixing system based on LMS adaptive algorithm for blind two source signals separation
Published 2007“…The time variant mixing matrix based on random vector with time variable elements are made. Several simulations obtain optimum results of implemented algorithm. …”
Get full text
Conference or Workshop Item -
11
MotionSure: a cloud-based algorithm for detection of injected object in data in motion
Published 2017“…Mostly, the Man In The Middle (MITM) attack happens in this stage by hijacking active session variables, manipulating files and objects. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
12
A novel inertia moment estimation algorithm collaborated with active force control scheme for wheeled mobile robot control in constrained environments
Published 2021“…The estimation is accomplished by calculating the membership function based on the experts’ views in any form (symmetric or non-symmetric) with lowly or highly overlapped linguistic variables. …”
Get full text
Get full text
Get full text
Get full text
Article -
13
A novel inertia moment estimation algorithm collaborated with active force control scheme for wheeled mobile robot control in constrained environments
Published 2021“…The estimation is accomplished by calculating the membership function based on the experts’ views in any form (symmetric or non-symmetric) with lowly or highly overlapped linguistic variables. …”
Get full text
Get full text
Get full text
Get full text
Article -
14
A novel inertia moment estimation algorithm collaborated with active force control scheme for wheeled mobile robot control in constrained environments
Published 2021“…The estimation is accomplished by calculating the membership function based on the experts’ views in any form (symmetric or non-symmetric) with lowly or highly overlapped linguistic variables. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
15
Forecasting hydrological parameters for reservoir system utilizing artificial intelligent models and exploring their influence on operation performance
Published 2019“…The three different optimization algorithms used in this study are the genetic algorithm (GA), particle swarm optimization (PSO) algorithm and shark machine learning algorithm (SMLA). …”
Get full text
Get full text
Article -
16
Tacit knowledge for business intelligence framework using cognitive-based approach
Published 2022“…Capturing the tacit knowledge is not a straightforward task, since it consists of unstructured data and related to a variety of information that is not always accessible through traditional means. …”
Get full text
Get full text
Thesis -
17
Process Planning Optimization In Reconfigurable Manufacturing Systems
Published 2008“…The five (5) AADTs include; a variant of the simulated annealing algorithm that implements heuristic knowledge at critical decision points, two (2) cooperative search schemes based on a “loose hybridization” of the Boltzmann Machine algorithm with (i) simulated annealing, and (ii) genetic algorithm search techniques, and two (2) modified genetic algorithms. …”
Get full text
Get full text
Thesis -
18
-
19
Analysis of boiler operational variables prior to tube leakage fault by artificial intelligent system
Published 2014“…The results showed that the NN with two hidden layers performed better than one hidden layer using Levenberg-Maquardt training algorithm. Moreover, it was noticed that hyperbolic tangent function for input and output nodes performed better than other activation function types. …”
Get full text
Get full text
Conference or Workshop Item -
20
Bayesian logistic regression model on risk factors of type 2 diabetes mellitus
Published 2016“…Logistic regression model has long been known and it is commonly used in analysing a binary outcome or dependent variable and connects the binary dependent variable to several independent variables. …”
Get full text
Get full text
Thesis
