Search Results - (( using function methods algorithm ) OR ( network implementation during algorithm ))
Search alternatives:
- network implementation »
- implementation during »
- methods algorithm »
- function methods »
- during algorithm »
- using function »
-
1
Real-time system identification of an unmanned quadcopter system using fully tuned radial basis function neural networks
Published 2021“…This automatic tuning algorithm will implement the network growing and pruning method to add or eliminate neurons in the RBF. …”
Get full text
Get full text
Article -
2
Real-time system identification of an unmanned quadcopter system using fully tuned radial basis function neural networks
Published 2021“…This automatic tuning algorithm will implement the network growing and pruning method to add or eliminate neurons in the RBF. …”
Get full text
Get full text
Article -
3
Firefly analytical hierarchy algorithm for optimal allocation and sizing of distributed generation in radial distribution network
Published 2022“…As for multi-objective functions associated with the optimisation problem, a weight-sum method is typically used to determine each objective function's coefficient factors (CF). …”
Get full text
Get full text
Get full text
Thesis -
4
Feedforward neural network for solving particular fractional differential equations
Published 2024“…This research aims to develop a scheme based on a feedforward neural network (FNN) with a vectorized algorithm (FNNVA) for solving FDEs in the Caputo sense (FDEsC) using selected first-order optimization techniques: simple gradient descent (GD), momentum method (MM), and adaptive moment estimation method (Adam). …”
Get full text
Get full text
Get full text
Thesis -
5
Air pollution forecasting in Kuala Terengganu using Artificial Neural Network (ANN) / Nur Raudzah Abdullah
Published 2020“…Existing researches on air pollution forecasting used a variety of machine learning algorithm. One of the popular algorithms used to forecast the air pollution is Artificial Neural Network (ANN). …”
Get full text
Get full text
Thesis -
6
Survey on Clustered Routing Protocols Adaptivity for Fire Incidents: Architecture Challenges, Data Losing, and Recommended Solutions
Published 2025“…Thus, developing an effective routing algorithm to optimize network functionality is a big concern. …”
Article -
7
-
8
Error concealment technique using wavelet neural network for wireless transmitted digital images
Published 2012“…The neural network architecture that can be used to implement a nonlinear vector predictor, including a multilayer perceptron (MLP), and a radial basis function network. …”
Get full text
Get full text
Thesis -
9
Enhancement load balancing in failover web server by using HTTP-response status techniques with pfsense opensource / Muhammad Hafiz Ramli
Published 2020“…Then, this paper will propose the architecture design and techniques will use during the implementation stage. Moreover, there will be a simulation with the research parameter. …”
Get full text
Get full text
Thesis -
10
Intelligent agent for electronic commerce using neural network approach / Yap Hui Sun
Published 2001“…It i been built by using the neural network of artificial intelligence approach. …”
Get full text
Get full text
Thesis -
11
-
12
Computational intelligence based power tracing for non discriminatory losses charge allocation and voltage stability improvement / Zulkiffli Abdul Hamid
Published 2013“…At first, in producing a good optimization algorithm, a hybridization technique was proposed for adopting the finest features of two different algorithms; namely the Genetic Algorithm (GA) and continuous domain Ant Colony Optimization (ACOr). …”
Get full text
Get full text
Thesis -
13
An e-voting application using cryptography technology
Published 2020“…In order to improve the security and confidentiality of the system, this system will also use the hashing function to complete. Hashing function mainly encrypts the user's confidential information to prevent theft by other users and the encrypt method can be implement from Visual Studio which is SHA-256 (Secure Hash Algorithm- 256 bits), a cryptographic hash function designed by US NSA (United States National Security Agency). …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
14
A hybrid optimization technique for solving economic emission load dispatch problems
Published 2023text::Final Year Project -
15
DurianCare: optimising trunk disease detection and precision farming in a mobile application / Muhammad Haziq Azmi
Published 2025“…The project will implement automated detection and disease management recommendation algorithms while evaluating the functionality and usability of the designed application. …”
Get full text
Get full text
Thesis -
16
Personal identification by Keystroke Pattern for login security
Published 2001“…Several other factors such as momentum, learning rate and various weight initialization were used for comparison. Three types of weight initialization were used, including Nguyen-Widrow (NW), Random and Genetic Algorithm (GA). …”
Get full text
Get full text
Thesis -
17
Development of an Isolated Digit Speech Recognition Based on Multilayer Perceptron Model
Published 2004“…A Neural Network (NN) approach is one of the famous methods and widely used in this field. …”
Get full text
Get full text
Thesis -
18
Application of augmented bat algorithm with artificial neural network in forecasting river inflow of hydroelectric reservoir stations in Malaysia
Published 2023“…Artificial intelligence (AI) was implemented to build forecasting models. However, standalone models, such as Artificial Neural Network (ANN), typically underperform during local convergence and resulted in slow-speed convergence. …”
text::Thesis -
19
Implementation of Biological Sprouting Algorithm for NoC Fault Tolerance
Published 2013Get full text
Get full text
Conference or Workshop Item -
20
Adaptive resonance theory-based hand movement classification for myoelectric control system
Published 2014“…This thesis investigates a pattern recognition approach for MCS that classifies hand movements accurately and computationally efficient to actuate different functions of a prosthetic hand. Five distinct hand movements are classified with an Adaptive Resonance Theory (ART) based neural network implemented, as it uses a combination of features extracted from four EMG signals. …”
Get full text
Get full text
Thesis
