Search Results - (( based solution learning algorithm ) OR ( variable detection based algorithm ))
Search alternatives:
- learning algorithm »
- variable detection »
- solution learning »
- detection based »
- based solution »
-
1
Hyper-heuristic approaches for data stream-based iIntrusion detection in the Internet of Things
Published 2022“…Here, the memory consumption can be reduced by enabling a feature selection algorithm that excludes nonrelevant features and preserves the relevant ones. the algorithm is developed based on the variable length of the PSO. …”
Get full text
Get full text
Thesis -
2
A deep learning approach for facial detection in targeted billboard advertising / Lau Sian En
Published 2025“…This research explores a deep learning-based facial detection system for targeted advertising, aiming to enhance consumer engagement by delivering personalized advertisements. …”
Get full text
Get full text
Get full text
Thesis -
3
Clustering ensemble learning method based on incremental genetic algorithms
Published 2012“…Firstly, an architecture for the clustering ensemble based on incremental genetic-based algorithms is proposed consisting of two phases: (i) to produce cluster partitions as initial populations, (ii) to combine cluster partitions and to generate final clustering solution by incremental genetic based clustering ensemble learning algorithm. …”
Get full text
Get full text
Thesis -
4
Observer-based fault detection with fuzzy variable gains and its application to industrial servo system
Published 2020“…The proposed fault detection algorithm employs a fuzzy logic-based approach with the objective of finding the appropriate observer gains that could cope with the different working conditions. …”
Get full text
Get full text
Get full text
Article -
5
PMT : opposition based learning technique for enhancing metaheuristic algorithms performance
Published 2020“…Nonetheless, OBL-based solutions often consider one particular direction of the opposition. …”
Get full text
Get full text
Thesis -
6
Comparing seabed roughness result from QPS fledermaus software, benthic trrain modeler [BTM] and developed model derived FRM slope variability algorithm for hard coral reef detecti...
Published 2018“…In this study, several models has been created which are from QPS Fledermaus model, BTM model and Slope Variability model. Slope variability model is an algorithm that is being used for detecting terrain roughness. …”
Get full text
Get full text
Thesis -
7
Robust diagnostics and variable selection procedure based on modified reweighted fast consistent and high breakdown estimator for high dimensional data
Published 2022“…The proposed algorithm has been applied to detect outliers in the high dimensional data. …”
Get full text
Get full text
Thesis -
8
Enhanced Adaptive Confidence-Based Q Routing Algorithms For Network Traffic
Published 2004“…These two adaptive routing algorithms enhance the existing Confidence-based Q (CQ) and Confidence-based Dual Reinforcement Q (CDRQ) Routing Algorithms. …”
Get full text
Get full text
Thesis -
9
Minimization of Test Cases and Fault Detection Effectiveness Improvement through Modified Reduction with Selective Redundancy Algorithm
Published 2007“…Then the algorithm gathers all the test cases based on the definition occurrence and def-use pair if they cover same definition occurrence of one variable but they don’t cover def-use pair of the same variable. …”
Get full text
Get full text
Thesis -
10
A modified generalized RBF model with EM-based learning algorithm for medical applications
Published 2006“…An EM-based training algorithm is also introduced, which uses fewer parameters compared to some classical supervised learning methods. …”
Get full text
Get full text
Get full text
Proceeding Paper -
11
Fault diagnostic algorithm for precut fractionation column
Published 2004“…Hazard and Operability Study (HAZOP) is used to support the diagnosis task. The algorithm has been successful in detecting the deviations of each variable by testing the data set. …”
Get full text
Get full text
Conference or Workshop Item -
12
Potential norms detection in social agent societies
Published 2023“…In this paper, we propose a norms mining algorithm that detects a domain's potential norms, which we called the Potential Norms Mining Algorithm (PNMA). …”
Article -
13
Artificial immune system based on real valued negative selection algorithms for anomaly detection
Published 2015“…With respect to all the algorithms, V-Detector proved to be superior and surpassed all other algorithms based on performance and execution time.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
14
Algorithm enhancement for host-based intrusion detection system using discriminant analysis
Published 2004“…Algorithms for building detection models are usually classified into two categories: misuse detection and anomaly detection. …”
Get full text
Get full text
Thesis -
15
Building norms-adaptable agents from Potential Norms Detection Technique (PNDT)
Published 2023“…This technique enables an agent to update its norms even in the absence of sanctions from a third-party enforcement authority as found in some work, which entail sanctions by a third-party to detect and identify the norms. The PNDT consists of five components: agent's belief base; observation process; Potential Norms Mining Algorithm (PNMA) to detect the potential norms and identify the normative protocol; verification process, which verifies the detected potential norms; and updating process, which updates the agent's belief base with new normative protocol. …”
Short Survey -
16
A harmony search-based learning algorithm for epileptic seizure prediction
Published 2016“…The proposed harmony search-based learning algorithm is used in the task of epileptic seizure prediction. …”
Get full text
Get full text
Article -
17
Machine-learning approach using thermal and synthetic aperture radar data for classification of oil palm trees with basal stem rot disease
Published 2021“…As the ALOS PALSAR-2 image was evaluated with dual-polarization (HH and HV), each digitized point has two distinct backscatter data with four severity levels (T0 to T3). The machine learning algorithm consistently performs well when presented with a well-balanced dataset. …”
Get full text
Get full text
Thesis -
18
Development of fault detection, diagnosis and control system identification using multivariate statistical process control (MSPC)
Published 2006“…Results showed that the developed FDD algorithm successfully detect and diagnosed the pre-designed faults. …”
Get full text
Get full text
Monograph -
19
Shape-based Road Sign Detection and Recognition for Embedded Application Using MATLAB
Published 2010“…The algorithm is based on the Hough transform method to detect lines in order to identify and determine the shape of the road sign. …”
Get full text
Get full text
Conference or Workshop Item -
20
An energy-efficient spectrum-aware reinforcement learning-based clustering algorithm for cognitive radio sensor networks
Published 2015“…In this paper, we propose a reinforcement learning-based spectrum-aware clustering algorithm that allows a member node to learn the energy and cooperative sensing costs for neighboring clusters to achieve an optimal solution. …”
Get full text
Get full text
Get full text
Article
