Search Results - (( leave application learning algorithm ) OR ( variable extraction schemes algorithm ))
Search alternatives:
- application learning »
- variable extraction »
- learning algorithm »
- leave application »
- schemes algorithm »
-
1
Towards Enhancing the Performance of Grid-Tied VSWT via Adopting Sine Cosine Algorithm-Based Optimal Control Scheme
Published 2021“…This paper is aimed at introducing a novel application of the sine cosine algorithm (SCA) which attempts to find the optimal gains of proportional-integral (PI) controllers used to control the power electronic converters (PEC) equipped with the variable speed wind turbine (VSWT) such that a maximum power extraction and performance enhancement can be realized. …”
Get full text
Get full text
Article -
2
Performance analysis of machine learning algorithms for classification of infection severity levels on rubber leaves
Published 2023“…Thus, this study was carried out to investigate the potential application of spectroscopic technology and machine learning algorithms to classify severity level of infected trees at early stage based on spectral data. …”
Get full text
Get full text
Get full text
Book Section -
3
-
4
Plant identification using combination of fuzzy c-means spatial pyramid matching, gist, multi-texton histogram and multiview dictionary learning
Published 2016“…Most of the existing plant identification methods are based on both the global shape features and the intact plant leaves. However, for the non-intact leaves such as the deformed, partial and overlapped leaves that largely exist in practice, the global shape features are not efficient and these methods are not applicable.The dried leave parts and noise can degrade identification results and affect the quality of the extracted features which lead to poor classification results. …”
Get full text
Get full text
Thesis -
5
Predicting the optimum compositions of a transdermal nanoemulsion system containing an extract of Clinacanthus nutans leaves (L.) for skin antiaging by artificial neural network mo...
Published 2017“…The optimum topologies were selected among the learning algorithms trained with lowest root mean square values. …”
Get full text
Get full text
Get full text
Article -
6
Integration of image processing algorithm and deep learning approaches to monitor ginger plant
Published 2024Get full text
Get full text
Final Year Project / Dissertation / Thesis -
7
Perturbation stochastic model updating of a bolted structure / Mohamad Azam Shah Aziz Shah
Published 2022“…The scheme was developed by introducing a multidimensional analysis consisting of a systematic quasi-random sampling algorithm. …”
Get full text
Get full text
Thesis -
8
Integration of image processing algorithm and deep learning approaches to monitor ginger plant
Published 2024Get full text
Get full text
Final Year Project / Dissertation / Thesis -
9
CAT CHAOTIC GENETIC ALGORITHM BASED TECHNIQUE AND HARDWARE PROTOTYPE FOR SHORT TERM ELECTRICAL LOAD FORECASTING
Published 2017“…In the hybrid scheme, the initial parameters of the modified BP neural network are optimized by using the global search ability of genetic algorithm, improved by cat chaotic mapping to enrich its optimization capability. …”
Get full text
Get full text
Thesis -
10
-
11
Fuzzy logic-based hill climbing technique for photovoltaic maximum power point tracking converter
Published 2013“…Simulation results are presented to validate performance of the algorithm under different irradiation schemes, and to compare with the results obtained from conventional algorithm. …”
Get full text
Get full text
Thesis -
12
State of charge estimation for lithium-ion battery based on random forests technique with gravitational search algorithm
Published 2023Conference Paper -
13
Simple Screening Method of Maize Disease using Machine Learning
Published 2019“…Hence, this paper present a simple and efficient machine learning method which is Fuzzy C-Means algorithm to screen leaf disease severity in maize. …”
Get full text
Get full text
Get full text
Article -
14
Smart Irrigation System Using Raspberry Pi
Published 2020“…Raspberry Pi, which is a palm-size computer is capable of running a machine learning process within it. The irrigation is automated by using machine learning algorithm that has been implemented on the system. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
15
An integrated anomaly intrusion detection scheme using statistical, hybridized classifiers and signature approach
Published 2015“…An Integrated Anomaly Detection Scheme ( IADS) is proposed to overcome the aforesaid drawbacks. …”
Get full text
Get full text
Thesis -
16
Cornsense: leaf disease detection application / Iffah Fatinah Mohamad Nasir
Published 2025“…The purpose of this project is to develop a mobile application for corn leaf disease detection leveraging the YOLOv8 (You Only Look Once version 8) object detection algorithm. …”
Get full text
Get full text
Thesis -
17
Future Trend of Artificial Intelligence and Stock Market: A Comprehensive Bibliometric Analysis
Published 2025“…Despite significant advancements, the integration of AI in stock markets remains underexplored in terms of evolving trends, collaborative research dynamics, and practical applications. Existing studies often focus on isolated techniques or case-specific applications, leaving a gap in understanding the broader landscape of AI’s role in reshaping financial systems. …”
Get full text
Get full text
Get full text
Get full text
Article -
18
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…Many programming languages are used for programming; Java programming language is known to be most common due to its features, the use of this popular language increases an attacker's ability to steal intellectual property (IP), as the source program is translated to an intermediate format retaining most of the information such as meaningful variables names present in source code. An attacker can easily reconstruct source code from such intermediate formats to extract sensitive information such as proprietary algorithms present in the software. …”
Get full text
Get full text
Thesis -
19
-
20
