Search Results - (( leave application learning algorithm ) OR ( variable extraction schemes algorithm ))

Refine Results
  1. 1

    Towards Enhancing the Performance of Grid-Tied VSWT via Adopting Sine Cosine Algorithm-Based Optimal Control Scheme by Shutari, H., Saad, N., Nor, N.B.M., Tajuddin, M.F.N., Alqushaibi, A., Magzoub, M.A.

    Published 2021
    “…This paper is aimed at introducing a novel application of the sine cosine algorithm (SCA) which attempts to find the optimal gains of proportional-integral (PI) controllers used to control the power electronic converters (PEC) equipped with the variable speed wind turbine (VSWT) such that a maximum power extraction and performance enhancement can be realized. …”
    Get full text
    Get full text
    Article
  2. 2

    Performance analysis of machine learning algorithms for classification of infection severity levels on rubber leaves by Mat Lazim, Siti Saripa Rabiah, Sulaiman, Zulkefly, Mat Nawi, Nazmi, Mohd Mustafah, Anas

    Published 2023
    “…Thus, this study was carried out to investigate the potential application of spectroscopic technology and machine learning algorithms to classify severity level of infected trees at early stage based on spectral data. …”
    Get full text
    Get full text
    Get full text
    Book Section
  3. 3
  4. 4

    Plant identification using combination of fuzzy c-means spatial pyramid matching, gist, multi-texton histogram and multiview dictionary learning by Safa, Soodabeh

    Published 2016
    “…Most of the existing plant identification methods are based on both the global shape features and the intact plant leaves. However, for the non-intact leaves such as the deformed, partial and overlapped leaves that largely exist in practice, the global shape features are not efficient and these methods are not applicable.The dried leave parts and noise can degrade identification results and affect the quality of the extracted features which lead to poor classification results. …”
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6
  7. 7

    Perturbation stochastic model updating of a bolted structure / Mohamad Azam Shah Aziz Shah by Aziz Shah, Mohamad Azam Shah

    Published 2022
    “…The scheme was developed by introducing a multidimensional analysis consisting of a systematic quasi-random sampling algorithm. …”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9

    CAT CHAOTIC GENETIC ALGORITHM BASED TECHNIQUE AND HARDWARE PROTOTYPE FOR SHORT TERM ELECTRICAL LOAD FORECASTING by ISLAM, BADAR UL ISLAM

    Published 2017
    “…In the hybrid scheme, the initial parameters of the modified BP neural network are optimized by using the global search ability of genetic algorithm, improved by cat chaotic mapping to enrich its optimization capability. …”
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11

    Fuzzy logic-based hill climbing technique for photovoltaic maximum power point tracking converter by Taghvaee, Mohammad Hossein

    Published 2013
    “…Simulation results are presented to validate performance of the algorithm under different irradiation schemes, and to compare with the results obtained from conventional algorithm. …”
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13

    Simple Screening Method of Maize Disease using Machine Learning by Chyntia Jaby, Entuni, Tengku Mohd Afendi, Zulcaffle

    Published 2019
    “…Hence, this paper present a simple and efficient machine learning method which is Fuzzy C-Means algorithm to screen leaf disease severity in maize. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Smart Irrigation System Using Raspberry Pi by Sahrom, Ahmad Syamil, Aminuddin, Raihah

    Published 2020
    “…Raspberry Pi, which is a palm-size computer is capable of running a machine learning process within it. The irrigation is automated by using machine learning algorithm that has been implemented on the system. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15

    An integrated anomaly intrusion detection scheme using statistical, hybridized classifiers and signature approach by Mohamed Yassin, Warusia

    Published 2015
    “…An Integrated Anomaly Detection Scheme ( IADS) is proposed to overcome the aforesaid drawbacks. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Cornsense: leaf disease detection application / Iffah Fatinah Mohamad Nasir by Mohamad Nasir, Iffah Fatinah

    Published 2025
    “…The purpose of this project is to develop a mobile application for corn leaf disease detection leveraging the YOLOv8 (You Only Look Once version 8) object detection algorithm. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Future Trend of Artificial Intelligence and Stock Market: A Comprehensive Bibliometric Analysis by Abdul Hayy Haziq, Mohamad, Rossazana, Ab Rahim, Norlina, Kadri

    Published 2025
    “…Despite significant advancements, the integration of AI in stock markets remains underexplored in terms of evolving trends, collaborative research dynamics, and practical applications. Existing studies often focus on isolated techniques or case-specific applications, leaving a gap in understanding the broader landscape of AI’s role in reshaping financial systems. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…Many programming languages are used for programming; Java programming language is known to be most common due to its features, the use of this popular language increases an attacker's ability to steal intellectual property (IP), as the source program is translated to an intermediate format retaining most of the information such as meaningful variables names present in source code. An attacker can easily reconstruct source code from such intermediate formats to extract sensitive information such as proprietary algorithms present in the software. …”
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20