Search Results - (( developing development action algorithm ) OR ( java implication _ algorithm ))
Search alternatives:
- development action »
- action algorithm »
- java implication »
-
1
Development of self-learning algorithm for autonomous system utilizing reinforcement learning and unsupervised weightless neural network / Yusman Yusof
Published 2019“…From the reviews, it is evident that autonomous system is set to handle finite number of encountered states using finite sequences of actions. In order to learn the optimized states-action policy the self-learning algorithm is developed using hybrid AI algorithm by combining unsupervised weightless neural network, which employs AUTOWiSARD and reinforcement learning algorithm, which employs Q-learning. …”
Get full text
Get full text
Thesis -
2
Adaptive artificial neural network for power system security assessment and control action
Published 2012“…Finally, a software tool based on an adaptive neural network for power system security assessment was developed. The idea of the AANN approach presented in this thesis is to generalise the security assessment method with the consideration of remedial action for any operating point. …”
Get full text
Get full text
Thesis -
3
An interactive analytics approach for sustainable and resilient case studies: a machine learning perspective
Published 2023“…Sustainable development is a problem-solving method that simultaneously accounts for the economic, environmental, and social impacts of actions. …”
Get full text
Get full text
Article -
4
Shunt active power filter using hybrid fuzzy-proportional and crisp-integral control algorithms for total harmonic distortion improvement
Published 2016“…In previous work, an Adaptive Linear Neuron (ADALINE) based extraction algorithm has been developed to generate reference currents. …”
Get full text
Get full text
Thesis -
5
Simulation of an adaptive artificial neural network for power system security enhancement including control action
Published 2015“…The developed method is proved to be a steady-state security assessment tool for supplying possible control actions to mitigate an insecure situation resulting from credible contingency. …”
Get full text
Get full text
Get full text
Article -
6
The application of suitable sports games for junior high school students based on deep learning and artificial intelligence
Published 2025“…This study intends to develop a Spatial Temporal-Graph Convolutional Network (ST-GCN) action detection algorithm based on the MediaPipe framework. …”
Get full text
Get full text
Get full text
Article -
7
Design and Implementation of Intelligent Interoperability Framework for Heterogeneous Subsystems in Smart Home Environment
Published 2011“…By inheriting the capabilities of XML SOAP technology and Web Services, three new algorithms based on Event-Condition-Action (ECA) paradigm have been developed to facilitate efficient interoperation of the heterogeneous subsystems. …”
Get full text
Get full text
Thesis -
8
Predicting attackers of online shaming using ant colony optimization / Noor Shafiqa Fazlien Mohamad Fauzi
Published 2020“…This study implemented Ant Colony Optimization Algorithm to develop classification rules for predicting the attackers of online shaming. …”
Get full text
Get full text
Thesis -
9
-
10
-
11
A novel deadlock detection algorithm for neighbour replication on grid environment
Published 2012“…The NRGDD simulation model has been developed to test the algorithm on NRG. Two experiments have been conducted to test the correctness of NRGDD algorithm. …”
Get full text
Get full text
Thesis -
12
Magnetic attitude control options for earth pointing small satellite
Published 2011“…The developed control algorithms are modeled using the MATLAB SIMULINK codes. …”
Get full text
Get full text
Thesis -
13
Adaptive hybrid fuzzy-proportional plus crisp-integral current control algorithm for shunt active power filter operation
Published 2016“…The Fuzzy-P current controller is developed to perform gain tuning procedure and proportional control action. …”
Get full text
Get full text
Article -
14
-
15
Development of land target following system of hexacopter
Published 2015“…This paper discussed the development of a land target following system for hexacopter using on-board camera. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
16
A hybrid database encryption algorithm based on reverse string and dynamic key
Published 2016“…Personal computers has become one of the important part of human life, especially when they using the Internet or any public networks.So, the information or data may still be deliberately or inadvertently leaked out by the insiders or customers.In this paper, we proposing new algorithm to protect any type of data, depending on the substitution techniques, using dynamic key (DK) and reveres string for each character in the text (or field in the file of the database) and each string .A special equation was developed to generate the DK, it’s depend on the length of string, order the character in the string,ASCII code of the character, and string sequence.The proposed algorithm using the reverse string before encryption, also, there are two actions after that, for the purpose of increasing the complexity of the algorithm.The results showed that The developed algorithm was successes to remove any duplicate encryption, for each character and each record even when the text duplicated.…”
Get full text
Get full text
Conference or Workshop Item -
17
DEEP LEARNING ALGORITHM IMPLEMENTATION FOR SHIP DETECTION IN SPOT SATELLITE IMAGES
Published 2019“…Not limited to commercial, this industry also includes naval sector and the small and medium industry of fisheries all over the world. The huge development throughout the industry has also develop many kinds of unlawful act such as piracy and illegal cargo transportation. …”
Get full text
Get full text
Final Year Project -
18
Predicting bankruptcy using ant colony optimization / Nur Syafiqah Abdul Ghani
Published 2021“…In model validation, to quantify accuracy by approving the informational collection, Ant Colony Optimization Algorithm was used and it was compared with the J48 algorithm. …”
Get full text
Get full text
Student Project -
19
Intelligent DNA signature detection for internet worms
Published 2011Get full text
Get full text
Get full text
Get full text
Monograph -
20
Comparison Method Q-Learning and SARSA for Simulation of Drone Controller using Reinforcement Learning
Published 2023“…A comparison of both Q-learning and State-ActionReward-State-Action (SARSA) based systems in autonomous drone application was performed for evaluation in this study. …”
Get full text
Get full text
Get full text
Article
