Search Results - (( patterns using algorithm ) OR ((( new learning algorithm ) OR ( e learning algorithm ))))*
Search alternatives:
- learning algorithm »
- using algorithm »
- patterns using »
- new learning »
- e learning »
-
1
Using GA and KMP algorithm to implement an approach to learning through intelligent framework documentation
Published 2023“…GA assists in optimizing the search process and performs machine learning. Within the GA, nearest neighbor algorithm is used in determining the most similar recorded case that can be used in solving the new case. …”
Conference paper -
2
A Truly Online Learning Algorithm using Hybrid Fuzzy ARTMAP and Online Extreme Learning Machine for Pattern Classification
Published 2023“…Algorithms; Benchmarking; E-learning; Knowledge acquisition; Learning systems; Pattern recognition; Bench-mark problems; Efficient learning; Extreme learning machine; Fuzzy ARTMAP; Generalization performance; Online learning; Online learning algorithms; Online sequential extreme learning machine; Learning algorithms…”
Article -
3
Alternate methods for anomaly detection in high-energy physics via semi-supervised learning
Published 2020“…In this paper, we introduce two new algorithms called EHRA and C-EHRA, which use machine learning regression and clustering to detect anomalies in samples. …”
Get full text
Get full text
Get full text
Article -
4
Prediction of stroke disease using machine learning techniques / Syarifah Adilah Mohamed Yusoff ... [et al.]
Published 2024“…This study has investigated five commonly used machine learning algorithm to be constructed as potential models for predicting stroke dataset. …”
Get full text
Get full text
Get full text
Article -
5
Immune Multiagent System for Network Intrusion Detection using Non-linear Classification Algorithm
Published 2010“…In this work, we integrate artificial immune algorithm with non-linear classification of pattern recognition and machine learning methods to solve the problem of intrusion detection in network systems. …”
Get full text
Get full text
Get full text
Citation Index Journal -
6
The development of an automated pattern recognition based on neural network / Irni Hamiza Hamzah, Mohammad Nizam Ibrahim and Linda Mohd Kasim
Published 2006“…The capability of powerful personal computers and affordable and high resolution sensors (i.e.: CCD cameras, microphones and scanners) have fostered the development of pattern recognition algorithms in new application domains (i.e.: fuzzy logic, neural network and genetic algorithm). …”
Get full text
Get full text
Research Reports -
7
Integrated Features by Administering the Support Vector Machine of Translational Initiations Sites in Alternative Polymorphic Context
Published 2012“…After learning, the discriminant functions are employed to decide whether a new sample is true or false. …”
Get full text
Get full text
Article -
8
An efficient fuzzy C-least median clustering algorithm
Published 2021“…In this paper we are discussing our new procedure for clustering called Fuzzy C-least median of squares algorithm which is an improvement to Fuzzy C-means (FCM) algorithm. …”
Get full text
Get full text
Get full text
Get full text
Article -
9
Implementing case-based reasoning approach to framework documentation
Published 2023“…During the "revise" and "retain" steps of the CBR, Knuth-Morris-Pratt (KMP) pattern matching algorithm is applied. � 2008 IEEE.…”
Conference paper -
10
Improved GART neural network model for pattern classification and rule extraction with application to power systems
Published 2023“…IGART enhances the dynamics of GART in several aspects, which include the use of the Laplacian likelihood function, a new vigilance function, a new match-tracking mechanism, an ordering algorithm for determining the sequence of training data, and a rule extraction capability to elicit if-then rules from the network. …”
Article -
11
APPLICATION OF LINK GRAMMAR IN SEMI-SUPERVISED NAMED ENTITY RECOGNITION FOR ACCIDENT DOMAIN
Published 2011“…In our research, extraction pattern from the first module will be fed to this algorithm and is used to make the prediction of named entity candidate category. …”
Get full text
Get full text
Thesis -
12
Modern fuzzy min max neural networks for pattern classification
Published 2019“…Among these algorithms, Fuzzy Min Max (FMM) neural network algorithm has been proven to be one of the premier neural networks for undertaking the pattern classification problems. …”
Get full text
Get full text
Thesis -
13
Classification of chest radiographs using novel anomalous saliency map and deep convolutional neural network
Published 2021“…Therefore, we also introduce the Xenafas algorithm in this paper. The algorithm creates a new kind of anomalous saliency map called the Intensity Probability Mapping and Weighted Intensity Probability Mapping. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
14
The enhanced BPNN-NAR and BPNN-NARMA models for Malaysian aggregate cost indices with outlying data
Published 2015“…In theory, the most common training algorithm for Backpropagation algorithms leans on reducing ordinary least squares estimator (OLS) or more specifically, the mean squared error (MSE). …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
15
E4ML: Educational Tool for Machine Learning
Published 2003“…There are various types of machine learning algorithms with certain processes taken by the algorithm.In teaching of the machine learning algorithms, such processes need to be explained especially to the beginner in introductory level.This paper discusses the development the tool that addresses the process by certain algorithm to produce a hypothesis or output based on given data.This tool can also be used in teaching and learning purposes.The explanation of processes by the algorithms is demonstrated through simple simulation.The source of the algorithms was adapted from Mitchell book [1] that cover popular algorithms in machine learning for teaching and learning such as Concept Learning, Decision Tree, Bayesian Learning, Neural Networks, and Instance based Learning.The tool also used several classes of Weka (Waikato Environment for Knowledge Analysis) as a basis for the design and implementation of the new tool that focuses on explaining the processes taken by certain algorithm.…”
Get full text
Get full text
Conference or Workshop Item -
16
Glass break detection system using deep auto encoders with fuzzy rules induction algorithm
Published 2019“…The algorithm reduces false alarms and improves detection accuracy. …”
Get full text
Get full text
Get full text
Get full text
Article -
17
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…The proposed security architecture is constructed as an adaptive way-forward Internet-of-Things (IoT) friendly security solution that is comprised of three cyclic parts: learn, predict and prevent. A novel security component named â��intelligent security engineâ�� is introduced which learns the possible occurrences of security threats on SOA using artificial neural networks learning algorithms, then it predicts the potential attacks on SOA based on obtained results by the developed theoretical security model, and the written algorithms as part of security solution prevent the SOA attacks. …”
Get full text
Get full text
Article -
18
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…The proposed security architecture is constructed as an adaptive way-forward Internet-of-Things (IoT) friendly security solution that is comprised of three cyclic parts: learn, predict and prevent. A novel security component named â��intelligent security engineâ�� is introduced which learns the possible occurrences of security threats on SOA using artificial neural networks learning algorithms, then it predicts the potential attacks on SOA based on obtained results by the developed theoretical security model, and the written algorithms as part of security solution prevent the SOA attacks. …”
Get full text
Get full text
Article -
19
Daily maximum load forecasting of consecutive national holidays using OSELM-based multi-agents system with weighted average strategy
Published 2023Subjects:Article -
20
Algorithm animation for cryptanalysis of caesar and hill ciphers / Sapiee Haji Jamel and Giuseppina Sherry Sayan
Published 2009“…Cryptanalysis steps can be easily explained using algorithm animation that can be easily integrated with any e-learning platform. …”
Get full text
Get full text
Get full text
Article
