Search Results - (( using function method algorithm ) OR ( after implementation learning algorithm ))

Refine Results
  1. 1

    Jogging activity recognition using k-NN algorithm by Afifah Ismail

    Published 2022
    “…The k-NN algorithm is a simple and easy-to-implement supervised machine learning algorithm that can be used to solve both classification and regression problems. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  2. 2
  3. 3

    Improving Attentive Sequence-to-Sequence Generative-Based Chatbot Model Using Deep Neural Network Approach by Wan Solehah, Wan Ahmad

    Published 2022
    “…The strategies applied showed that the final accuracy obtained through the training after implementing a modification in the algorithm is at 81% accuracy rate compared to the basic model that recorded its final accuracy at 79% accuracy rate. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5

    Prediction Of Petroleum Reservoir Properties Using Nonlinear Feature Selection And Ensembles Of Computational Intelligence Techniques by Anifowose, Fatai Adesina

    Published 2015
    “…The algorithms were implemented with optimized tuning parameters and validated with real-life porosity and permeability datasets obtained from diverse and heterogeneous petroleum reservoirs after they have passed on testing them with a benchmark dataset from the UCI Machine Learning Repository. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    An optimized ensemble for predicting reservoir rock properties in petroleum industry by Kenari, Seyed Ali Jafari

    Published 2013
    “…The first method isbased on fuzzy genetic algorithm to overcome the premature convergence. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Postal address handwritten recognition using convolutional neural network / Nur Hasyimah Abd Aziz by Abd Aziz, Nur Hasyimah

    Published 2020
    “…Today, handwritten recognition becomes a very crucial area in the field of pattern recognition and image processing. Deep learning was commonly used for handwriting recognition. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Incremental learning for large-scale stream data and its application to cybersecurity by Ali, Siti Hajar Aminah

    Published 2015
    “…These results indi�cate that the proposed method can improve the RAN learning algorithm towards the large-scale stream data processing. …”
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11

    Cyberbullying detection: a machine learning approach by Yeong, Su Yen

    Published 2022
    “…Machine learning is a hot topic and it is widely implemented in software, web application and more. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  12. 12

    Spatial Data Mining Model For Landfill Sites Suitability Mapping Based On Neural Networks And Multivariate Analysis by Abujayyab, Sohaib K. M.

    Published 2017
    “…Hybrid neural network was utilized as an evaluation method to select the optimal selection method and optimal training algorithm. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Music Recommender System Using Machine Learning Content-Based Filtering Technique by Foong, Kin Hong

    Published 2022
    “…In this study, methods of K-Mean Clustering, Euclidean Distance and Cosine Similarity are implemented. These are the popular algorithm for unsupervised learning, a machine learning method to analyse and cluster datasets. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  14. 14

    Finding the root of nonlinear function using five bracketing method / Nur Afiqah Mohamed Azhar by Mohamed Azhar, Nur Afiqah

    Published 2019
    “…Therefore, numerical method in the form of bracketing method is often used to find only the approximate root of the function. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Effects of Different Pre-Trained Deep Learning Algorithms as Feature Extractor in Tomato Plant Health Classification by Chong, Hou Ming, Yin Yap, Xien, Seng Chia, Kim

    Published 2023
    “…This study proposes a system that can classify tomato plant health into five categories of healthy, early blight, late blight, bacterial spot, and yellow leaf curl virus based on their leaves using deep learning algorithms as feature extractors. Five different pre-trained deep learning algorithms (i.e. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Gravitational search – bat algorithm for solving single and bi-objective of non-linear functions by Abbas, Iraq Tareq

    Published 2018
    “…The second technique is to solve bi-objective functions by using the BOBAT algorithm. The third technique is an integration of BOGSA with BOBAT to produce a BOGSBAT algorithm. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Determining the preprocessing clustering algorithm in radial basis function neural network by S.L. Ang, H.C. Ong, H.C. Law

    Published 2008
    “…Three types of method used in this study to find the centres include random selections, K-means clustering algorithm and also K-median clustering algorithm. …”
    Get full text
    Get full text
    Article
  18. 18

    Phishing attack detection using machine learning method by Jupin, John Arthur

    Published 2019
    “…The study of this algorithm is made thoroughly and the methods in implementing this algorithm have been discussed in detail. …”
    Get full text
    Get full text
    Get full text
    Undergraduates Project Papers
  19. 19
  20. 20

    Effects of Different Pre-Trained Deep Learning Algorithms as Feature Extractor in Tomato Plant Health Classification by Hou Ming Chong, Hou Ming Chong, Xien Yin Yap, Xien Yin Yap, Kim Seng Chia, Kim Seng Chia

    Published 2023
    “…This study proposes a system that can classify tomato plant health into five categories of healthy, early blight, late blight, bacterial spot, and yellow leaf curl virus based on their leaves using deep learning algorithms as feature extractors. Five different pre-trained deep learning algorithms (i.e. …”
    Get full text
    Get full text
    Get full text
    Article