Search Results - (( variables activation function algorithm ) OR ( based segmentation mining algorithm ))

Refine Results
  1. 1

    Image clustering comparison of two color segmentation techniques by Subramaniam, Kavitha Pichaiyan

    Published 2010
    “…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    Finding objects with segmentation strategy based multi robot exploration in unknown environment by Arezoumand, Reza, Mashohor, Syamsiah, Marhaban, Mohammad Hamiruce

    Published 2013
    “…Two algorithms were investigated in this paper one is frontier based random search algorithm and the second is efficient algorithm based on segmentation strategy. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3
  4. 4

    Framework for stream clustering of trajectories based on temporal micro clustering technique by Abdulrazzaq, Musaab Riyadh

    Published 2018
    “…In the preprocessing stage, the On-Line Noise Filtering Algorithm for Trajectory Segmentation Based on Minimum Description Length concept (ONF_TRS) is proposed to achieve trajectory segmentation and remove noise points in real time with low computational cost. …”
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6

    Improvement on rooftop classification of worldview-3 imagery using object-based image analysis by Norman, Masayu

    Published 2019
    “…Then, the classifier (support vector machine (SVM) and data mining (DM) algorithm, decision tree (DT) were applied on each fusion image and their accuracy were evaluated. …”
    Get full text
    Get full text
    Thesis
  7. 7

    A detailed description on unsupervised heterogeneous anomaly based intrusion detection framework by Udzir, Nur Izura, Hajamydeen, Asif Iqbal

    Published 2019
    “…More effort has been taken in utilizing the data mining and machine learning algorithms to construct anomaly based intrusion detection systems, but the dependency on the learned models that were built based on earlier network behaviour still exists, which restricts those methods in detecting new or unknown intrusions. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8
  9. 9

    Data-Driven Approach to Modeling Biohydrogen Production from Biodiesel Production Waste: Effect of Activation Functions on Model Configurations by Hossain, S.K.S., Ayodele, B.V., Alhulaybi, Z.A., Alwi, M.M.A.

    Published 2022
    “…The RBFNN model with softmax as the hidden layer activation function and identity as the outer layer activation function has the least predictive performance, as indicated by an R2 of 0.403 and a RMSE of 301.55. …”
    Get full text
    Get full text
    Article
  10. 10

    Shunt active power filter using hybrid fuzzy-proportional and crisp-integral control algorithms for total harmonic distortion improvement by Abdul Rahman, Nor Farahaida

    Published 2016
    “…Utilization of soft-computing algorithms in the operation of Shunt Active Power Filters (SAPFs) becomes a latest trend. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Real time De-mixing system based on LMS adaptive algorithm for blind two source signals separation by Mehrkanoon, S., Moghavvemi, M., Fariborzi, H.

    Published 2007
    “…The time variant mixing matrix based on random vector with time variable elements are made. Several simulations obtain optimum results of implemented algorithm. …”
    Get full text
    Conference or Workshop Item
  12. 12
  13. 13

    MotionSure: a cloud-based algorithm for detection of injected object in data in motion by Islam, Thouhedul, Olanrewaju, Rashidah Funke, Khalifa, Othman Omran

    Published 2017
    “…Mostly, the Man In The Middle (MITM) attack happens in this stage by hijacking active session variables, manipulating files and objects. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  14. 14
  15. 15
  16. 16
  17. 17

    Forecasting hydrological parameters for reservoir system utilizing artificial intelligent models and exploring their influence on operation performance by Allawi, Mohammed Falah, Jaafar, Othman, Mohamad Hamzah, Firdaus, Koting, Suhana, Mohd, Nuruol Syuhadaa, El-Shafie, Ahmed

    Published 2019
    “…The three different optimization algorithms used in this study are the genetic algorithm (GA), particle swarm optimization (PSO) algorithm and shark machine learning algorithm (SMLA). …”
    Get full text
    Get full text
    Article
  18. 18

    Process Planning Optimization In Reconfigurable Manufacturing Systems by Musharavati, Farayi

    Published 2008
    “…The five (5) AADTs include; a variant of the simulated annealing algorithm that implements heuristic knowledge at critical decision points, two (2) cooperative search schemes based on a “loose hybridization” of the Boltzmann Machine algorithm with (i) simulated annealing, and (ii) genetic algorithm search techniques, and two (2) modified genetic algorithms. …”
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20

    Analysis of boiler operational variables prior to tube leakage fault by artificial intelligent system by Al-Kayiem, H.H., Al-Naimi, F.B.I., Amat, W.N.B.W.

    Published 2014
    “…The results showed that the NN with two hidden layers performed better than one hidden layer using Levenberg-Maquardt training algorithm. Moreover, it was noticed that hyperbolic tangent function for input and output nodes performed better than other activation function types. …”
    Get full text
    Get full text
    Conference or Workshop Item