Search Results - (( developing effective using algorithm ) OR ( code application learning algorithm ))
Search alternatives:
- application learning »
- learning algorithm »
- code application »
- effective using »
- using algorithm »
-
1
Learning Algorithm effect on Multilayer Feed Forward Artificial Neural Network performance in image coding
Published 2007“…Based on Gradient Descent, Conjugate Gradient, Quasi-Newton techniques three different error back propagation algorithms have been developed for use in training two types of neural networks, a single hidden layer network and three hidden layers network. …”
Get full text
Get full text
Get full text
Article -
2
Network Traffic Classification Analysis on Differentiated Services Code Point Using Deep Learning Models for Efficient Deep Packet Inspection
Published 2024“…This study develops and analyze using neural network-based models for effective classification of data packets using the DSCP header field. …”
Get full text
Get full text
Get full text
Article -
3
Fog-cloud scheduling simulator for reinforcement learning algorithms
Published 2023“…Furthermore, three validation steps have been used to measure the simulator’s effectiveness: real-time visualization, intense task arrival, and preservation test have been used, and the results proved the simulator suitable for dealing with realistic situations.…”
Get full text
Get full text
Article -
4
Applying case reuse and Rule-Based Reasoning (RBR) in object-oriented application framework documentation: Analysis and design
Published 2023“…The main objective of an object-oriented application framework is to promote the reuse of both design and code in the development of new applications. …”
Conference Paper -
5
An evaluation of Monte Carlo-based hyper-heuristic for interaction testing of industrial embedded software applications.
Published 2020“…Addressing this issue, we propose to integrate the memory into EMCQ for combinatorial t-wise test suite generation using reinforcement learning based on the Q-learning mechanism, called Q-EMCQ. …”
Get full text
Get full text
Get full text
Article -
6
Improving hand written digit recognition using hybrid feature selection algorithm
Published 2022“…Therefore, many researchers have applied and developed various machine learning algorithms that could efficiently tackle the handwritten digit recognition problem. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
7
-
8
Graphical user interface test case generation for android apps using Q-learning / Husam N. S. Yasin
Published 2021“…The computation time complexity of the Q-Learning-based test coverage algorithm was also analyzed. …”
Get full text
Get full text
Get full text
Thesis -
9
Plant identification using combination of fuzzy c-means spatial pyramid matching, gist, multi-texton histogram and multiview dictionary learning
Published 2016“…Moreover, instead of concatenating feature vectors together and send to classifier, sparse coding and dictionary learning methods are used and instead of considering all features as one view (visual feature), K-SVD algorithm that is one of the famous algorithms for sparse representation is optimized and developed to multi-view model.The experimental results prove that the proposed methods has improved accuracy by 53.77% compared to concatenating features and classic K-SVD dictionary learning model as well.…”
Get full text
Get full text
Thesis -
10
Detection of SQL injection attack using machine learning
Published 2024“…The machine learning algorithms employed in this study encompass Convolutional Neural Networks (CNN), Logistic Regression, Naïve Bayes Classifier, Support Vector Machine, and Random Forest. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
11
A Review on feature selection and ensemble techniques for intrusion detection system
Published 2021“…The design of such a system relies on the detection methods used, particularly the feature selection techniques and machine learning algorithms used. …”
Get full text
Get full text
Article -
12
Static code analysis of permission-based features for android malware classification using apriori algorithm with particle swarm optimization
Published 2015“…In this method, permission-based features were extracted from Android applications byte-code through static code analysis, selected and were used to train supervised classifiers. …”
Get full text
Get full text
Get full text
Article -
13
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis -
14
Improving brain tumor segmentation in MRI images through enhanced convolutional neural networks
Published 2023“…The evaluations show that the proposed technique is significantly more effective than those currently in use. In the future, enhancement of the segmentation using artificial neural networks will help in the earlier and more precise detection of brain tumors. …”
Get full text
Get full text
Article -
15
Android Malware classification using static code analysis and Apriori algorithm improved with particle swarm optimization
Published 2014“…In this method, features were extracted from Android applications byte-code through static code analysis, selected and were used to train supervised classifiers. …”
Get full text
Get full text
Get full text
Proceeding Paper -
16
Operational structural damage identification using de-noised modal feature in machine learning / Chen Shilei
Published 2021“…By integrating ISMA, both supervised and unsupervised machine learning algorithms were investigated to develop real-time damage identification schemes. …”
Get full text
Get full text
Get full text
Thesis -
17
Enhanced Q-Learning algorithm for potential actions selection in automated graphical user interface testing
Published 2023“…We utilized the enhanced Q-Learning algorithm to compare actions, including context-based actions, to effectively achieve higher code coverage. …”
Get full text
Get full text
Get full text
Thesis -
18
-
19
Kodepoly: an engaging approach to blended futuristic learning in coding
Published 2024“…By combining the strategic elements of Monopoly with a curriculum comprised of coding challenges, debugging exercises, and algorithmic puzzles, Kodepoly aims to render the learning process both enjoyable and substantial in content. …”
Get full text
Get full text
Proceeding Paper -
20
Improving the exploration strategy of an automated android GUI testing tool based on the Q-Learning algorithm by selecting potential actions
Published 2022“…We utilise the Q-Learning algorithm to compare actions, including context-based actions, to effectively detect crashes and achieve a higher code coverage.…”
Get full text
Get full text
Article
