Search Results - (( using function machine algorithm ) OR ( parameter detection method algorithm ))

Refine Results
  1. 1

    Optimisation of support vector machine hyperparameters using enhanced artificial bee colony variant to diagnose breast cancer by Ravindran, Nadarajan

    Published 2023
    “…The combination of these two aspects can assist to balance and enhance the exploration and exploitation capability. Before using the JAABC5ROC as an optimizer for the SVM, a total of 10 benchmark function were used to determine its performance assessment 5 common benchmarks which are (Shows Rosenbrok, Sphere, Step and RS Schwefel Ridges and RS Zekhelip) and 5 CEC2017 benchmarks which are (Shifted and Rotated Zakharov Function, Hybrid Function 01, Composite Function 08, Composite Function 09 and Composite Function 10). …”
    Get full text
    Get full text
    Thesis
  2. 2

    Detection of sweetness level for fruits (watermelon) with machine learning by Wan Nazulan, Wan Nurul Suraya, Asnawi, Ani Liza, Mohd Ramli, Huda Adibah, Jusoh, Ahmad Zamani, Ibrahim, Siti Noorjannah, Mohamed Azmin, Nor Fadhillah

    Published 2020
    “…The objective of this work is to investigate the sweetness parameter for the fruit’s detection and classification algorithm in machine learnings. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  3. 3
  4. 4

    Improvement on rooftop classification of worldview-3 imagery using object-based image analysis by Norman, Masayu

    Published 2019
    “…The accuracy of each algorithm was evaluated using LibSVM, Bayes network, and Adaboost classifier. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Operational structural damage identification using de-noised modal feature in machine learning / Chen Shilei by Chen , Shilei

    Published 2021
    “…Meanwhile, the unsupervised learning method using PCA-WCC features is good at detecting unknown damage, and is sensitive to low-severity damage. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    An effective source number enumeration approach based on SEMD by Ge, Shengguo, Mohd Rum, Siti Nurulain, Ibrahim, Hamidah, Marsilah, Erzam, Perumal, Thinagaran

    Published 2022
    “…In signal processing, empirical mode decomposition (EMD) first decomposes the received single-channel signal into several intrinsic mode functions (IMFs) and a residual, and then uses machine learning methods for source number enumeration. …”
    Get full text
    Get full text
    Article
  7. 7

    Intelligent fault diagnosis for broken rotor bar using wavelet packet signature analysis by Zolfaghari, Sahar

    Published 2016
    “…The fault detection and classification algorithm is carried out under the unknown dataset and the off-line testing results with 98.8% classification accuracy indicate good reliability of the proposed method in identifying broken rotor bars severity.…”
    Get full text
    Get full text
    Thesis
  8. 8

    New techniques incorporating computational intelligence based for voltage stability evaluation and improvement in power system / Nur Fadilah Ab. Aziz by Ab. Aziz, Nur Fadilah

    Published 2014
    “…Another new hybrid algorithm that used Evolutionary Programming (EP) termed as Evolutionary Support Vector Machine (ESVM) was also developed for comparative study. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Monitoring water quality in Pusu river using Internet of Things (IoT) and Machine Learning (ML) by Kabbashi, Nassereldeen Ahmed, Hasan, Tahsin Fuad, Alam, Md Zahangir, Saleh, Tanveer, Hassan Abdalla Hashim, Aisha

    Published 2024
    “…Machine learning (ML) tools will be employed to analyze and simulate these data, enabling the prediction of future water quality parameters. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Parameter estimation and outlier detection in linear functional relationship model / Adilah Abdul Ghapor by Adilah, Abdul Ghapor

    Published 2017
    “…The simulation results indicate that the proposed method is suitable to detect a single outlier. As for the multiple outliers, a clustering algorithm is considered and a dendogram to visualise the clustering algorithm is used. …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    Application of weighted average on modal parameters for damage detection algorithms: Case study on steel beam by Fayyadh, M.M., Abdul Razak, H.

    Published 2011
    “…This study verifies the use of the proposed weighting method by Fayyadh and Abdul Razak (2011a) for damage detection algorithms applied on cracked steel beam. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12
  13. 13

    Improved TLBO-JAYA Algorithm for Subset Feature Selection and Parameter Optimisation in Intrusion Detection System by Aljanabi, Mohammad, Mohd Arfian, Ismail, Mezhuyev, Vitaliy

    Published 2020
    “…The proposed method combined the improved teaching-learning-based optimisation (ITLBO) algorithm, improved parallel JAYA (IPJAYA) algorithm, and support vector machine. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Integrated combined layer algorithm of jamming detection and classification in manet / Ahmad Yusri Dak by Dak, Ahmad Yusri

    Published 2019
    “…This creates the jamming detection and classification parameters. The second stage is detecting jammers by integrating both lower layers by developing Integrated Combined Layer Algorithm (ICLA). …”
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16

    Binary Coati Optimization Algorithm- Multi- Kernel Least Square Support Vector Machine-Extreme Learning Machine Model (BCOA-MKLSSVM-ELM): A New Hybrid Machine Learning Model for Pr... by Sammen S.S., Ehteram M., Sheikh Khozani Z., Sidek L.M.

    Published 2024
    “…For water level prediction, lagged rainfall and water level are used. In this study, we used extreme learning machine (ELM)-multi-kernel least square support vector machine (ELM-MKLSSVM), extreme learning machine (ELM)-LSSVM-polynomial kernel function (PKF) (ELM-LSSVM-PKF), ELM-LSSVM-radial basis kernel function (RBF) (ELM-LSSVM-RBF), ELM-LSSVM-Linear Kernel function (LKF), ELM, and MKLSSVM models to predict water level. …”
    Article
  17. 17

    Landslide risk zoning using support vector machine algorithm by Ghiasi V., Pauzi N.I.M., Karimi S., Yousefi M.

    Published 2024
    “…The weighted maps were then combined using the support vector machine algorithm. For the training and testing of the machine, 81 slippery ground points and 81 non-sliding points were used. …”
    Article
  18. 18

    Improved hybrid teaching learning based optimization-jaya and support vector machine for intrusion detection systems by Mohammad Khamees Khaleel, Alsajri

    Published 2022
    “…Most of the currently existing intrusion detection systems (IDS) use machine learning algorithms to detect network intrusion. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Improved intrusion detection algorithm based on TLBO and GA algorithms by Aljanabi, Mohammad, Mohd Arfian, Ismail

    Published 2021
    “…The NTLBO was proposed in this paper as an FSS mechanism; its algorithm-specific, parameter-less concept (which requires no parameter tuning during an optimization) was explored. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Outlier detection in circular regression model using minimum spanning tree method by Nur Faraidah, Muhammad Di, Siti Zanariah, Satari, Roslinazairimah, Zakaria

    Published 2019
    “…The existence of outliers in a circular regression model can lead to many errors, for example in inferences and parameter estimations. Therefore, this study aims to develop new algorithms that can detect outliers by using the minimum spanning tree method. …”
    Get full text
    Get full text
    Conference or Workshop Item