Search Results - (( based evaluation a algorithm ) OR ( shape identification learning algorithm ))*

Refine Results
  1. 1

    Data mining for structural damage identification using hybrid artificial neural network based algorithm for beam and slab girder / Meisam Gordan by Meisam , Gordan

    Published 2020
    “…After evaluating the results of these algorithms, a hybrid Artificial Neural Network-based Imperial Competitive Algorithm (ANN-ICA) was presented in the deployment step of the proposed methodology to identify the structural damage of illustrative structures. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    Detection of sweetness level for fruits (watermelon) with machine learning by Wan Nazulan, Wan Nurul Suraya, Asnawi, Ani Liza, Mohd Ramli, Huda Adibah, Jusoh, Ahmad Zamani, Ibrahim, Siti Noorjannah, Mohamed Azmin, Nor Fadhillah

    Published 2020
    “…Then, each watermelon is grouped into Grade A (high level of sweetness), Grade B (medium level of sweetness), and Grade C (low level of sweetness) based on its color and shape detection results. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  3. 3

    Content-based indexing of low resolution documents by Md Nor, Danial

    Published 2016
    “…The assessment of the proposed indexing scheme is conducted based on recall and precision, a standard CBIR retrieval performance evaluation. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    Plant identification using combination of fuzzy c-means spatial pyramid matching, gist, multi-texton histogram and multiview dictionary learning by Safa, Soodabeh

    Published 2016
    “…Most of the existing plant identification methods are based on both the global shape features and the intact plant leaves. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Zero distortion-based steganography for handwritten signature by Iranmanesh, Vahab

    Published 2018
    “…In this thesis, the human handwritten signature is introduced as a novel cover media (c) in conjunction with a steganography algorithm since there is a level of variability (i.e intra-user variability) within handwritten signature samples of an individual. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Operational structural damage identification using de-noised modal feature in machine learning / Chen Shilei by Chen , Shilei

    Published 2021
    “…By integrating ISMA, both supervised and unsupervised machine learning algorithms were investigated to develop real-time damage identification schemes. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Identification of tajwid using artificial neural networks / Zunnajah Kamaruddin by Kamaruddin, Zunnajah

    Published 2005
    “…In order to have a system which has an ability to learn, back-propagation learning algorithm is used. …”
    Get full text
    Get full text
    Thesis
  8. 8

    SLIDING WINDOW TRAINING ALGORITHMS USING MLP-NETWORK FOR CORRELATED AND LOST PACKET DATA by AHMED IZZELDIN, HUZAIFA TAWFEIG

    Published 2012
    “…This thesis gives a systematic investigation of various MLP learning mainly Sliding Window (SW) learning mode which is treated as the adaptation of offline algorithms into online application Consequently this thesis reviews various offline algorithms including: batch backpropagation, nonlinear conjugate gradient, limited memory and full-memory Broyden, Fletcher, Goldfarb and Shanno algorithms and different forms of the latest proposed bimary ensemble learning. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Classification of Citrus (Rutaceae) by Using Image Processing by Najwa Bari'ah Mohd Tabri

    Published 2019
    “…A machine learning algorithms, SVM have been used to build species identification models. …”
    Get full text
    Get full text
    Undergraduate Final Project Report
  10. 10

    Bacteria identification via Artificial Neural Network based-on Bergey’s manual by Ruhaimi, Amirul Hafiiz

    Published 2017
    “…Levenberg Marquardt algorithm based Feed-forward backpropagation with Multilayer perceptron type of ANN was used in the training and learning sessions of the ANN development in order to obtain high accuracy simulation results within short period of time.…”
    Get full text
    Get full text
    Student Project
  11. 11

    Application of artificial neural network in bacteria identification based on Bergey’s manual: Hydrogenophilaceae family: article by Ruhaimi, Amirul Hafiiz, Ahmad, Normadyzah, Husin, Hazlina, Mohamad Pauzi, Syazana

    Published 2017
    “…Levenberg Marquardt algorithm based Feedforward backpropagation with Multilayer perceptrons type of ANN was used in the training and learning sessions of the ANN development in order to obtain high accuracy simulation results. within short period time.…”
    Get full text
    Get full text
    Article
  12. 12
  13. 13
  14. 14

    Classification of metal screw defect detection using FOMO on edge impulse / Muhammad Imran Daing by Daing, Muhammad Imran

    Published 2025
    “…The introduction of deep learning, particularly in visual detection, offers a significant improvement in the effectiveness and precision of defect identification. …”
    Get full text
    Get full text
    Student Project
  15. 15
  16. 16

    Exploring Text Recognition Segmentation and Detection in Natural Scene Images by Wydyanto, ., Maria, Ulfa

    Published 2024
    “…Identification, segmentation, and recognition of fonts from real-world images are major challenges in computer vision, particularly due to subtle differences in font shapes, lighting, and backgrounds. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    A New Swarm-Based Framework for Handwritten Authorship Identification in Forensic Document Analysis by Draman @ Muda, Azah Kamilah, Choo, Yun Huoy, Draman @ Muda, Noor Azilah

    Published 2014
    “…This chapter instead focuses on identifying the unique individual significant features of word shape by using feature selection method prior the identification task. …”
    Get full text
    Get full text
    Book Chapter
  18. 18

    A new swarm-based framework for handwritten authorship identification in forensic document analysis by Pratama, Satrya Fajri, Draman @ Muda, Azah Kamilah, Choo, Yun Huoy, Draman @ Muda, Noor Azilah

    Published 2014
    “…This chapter instead focuses on identifying the unique individual significant features of word shape by using feature selection method prior the identification task. …”
    Get full text
    Get full text
    Book Chapter
  19. 19

    In silico approaches for unearthing bacterial quorum-sensing inhibitors against pathogenic bacteria by Pawar, Shrikant, Bramha Chari, P. V., Lahiri, Chandrajit *

    Published 2019
    “…Thus, certain group of researchers also developed machine learning tools based on support vector machine (SVM) and hidden Markov models (HMM) for the identification of novel and effective biofilm inhibitory peptides (BIPs), while others used in silico approaches for predicting and designing of antibiofilm peptides usingbidirectional recursive neural network (BRNN) and Random Forest (RF) algorithms. …”
    Get full text
    Get full text
    Book Section
  20. 20

    Sudoku Generator based on hybrid algorithm / Faridah Abdul Rahman by Abdul Rahman, Faridah

    Published 2012
    “…After testing and evaluation the prototype, the result shows that the Sudoku generator based on hybrid algorithm takes more times on solving the Sudoku. …”
    Get full text
    Get full text
    Thesis