Search Results - (( java implementation amh algorithm ) OR ( using self using algorithm ))
Search alternatives:
- java implementation »
- implementation amh »
- using algorithm »
- amh algorithm »
- self using »
-
1
Activity recognition using one-versus-all strategy with relief-f and self-adaptive algorithm
Published 2018“…Many researchers dealing with smartphone sensors to recognize human activities using machine learning algorithms. In this paper, we proposed One-versus-All (OVA) strategy with relief-f and self-adaptive algorithm to recognize these activities. …”
Get full text
Get full text
Conference or Workshop Item -
2
Development of self-learning algorithm for autonomous system utilizing reinforcement learning and unsupervised weightless neural network / Yusman Yusof
Published 2019“…From the reviews, it is evident that autonomous system is set to handle finite number of encountered states using finite sequences of actions. In order to learn the optimized states-action policy the self-learning algorithm is developed using hybrid AI algorithm by combining unsupervised weightless neural network, which employs AUTOWiSARD and reinforcement learning algorithm, which employs Q-learning. …”
Get full text
Get full text
Thesis -
3
Self-similar network traffic using Successive Random Addition (SRA) algorithm / Hani Hamira Harun
Published 2006“…In this project, we have used the Successive random algorithm (SRA). Then, we have decided to use Variance time plot and R/S statistics as our statistical analysis tools. …”
Get full text
Get full text
Thesis -
4
Self-similar network traffic using Random Midpoint Displacement (RMD) algorithm / Jumaliah Saarini
Published 2006“…The way to solve this problem, we applied the existed method in visual C++ programming with used the Random midpoint Displacement (RMD) algorithm. …”
Get full text
Get full text
Student Project -
5
Detecting resource consumption attack over MANET using an artificial immune algorithm
Published 2011“…This paper’s objective is to utilize the biological model used in the dendritic cell algorithm (DCA) to introduce a Dendritic Cell Inspired Intrusion Detection Algorithm (DCIIDA). …”
Get full text
Get full text
Get full text
Article -
6
Static and self-scalable filter range selection algorithms for peer-to-peer networks
Published 2011“…Two multiple selection algorithm, which are known as “static filter range selection algorithm” and “self-scalable selection algorithm” are proposed. …”
Get full text
Get full text
Thesis -
7
Exploring dynamic self-adaptive populations in differential evolution
Published 2006“…Using De Jong's F1-F5 benchmark test problems, we showed that DE with self-adaptive populations produced highly competitive results compared to a conventional DE algorithm with static populations. …”
Get full text
Get full text
Get full text
Article -
8
Intrusion Prevention and Self-Healing Algorithms Inspired by Danger Theory
Published 2010“…The abnormal activities are prevented and healed by the presented algorithms. We show how the use of biological immune systems, which incorporate an innate, adaptive immune system and self-healing mechanism, can reduce the number of false alerts and heal the damage caused by intrusion. …”
Get full text
Get full text
Conference or Workshop Item -
9
A fault syndromes simulator for random access memories
Published 2008“…At present, the March test algorithm is used to detect and diagnose all faults related to Random Access Memories. …”
Get full text
Get full text
Article -
10
DC-link capacitor voltage control for single-phase shunt active power filter with step size error cancellation in self-charging algorithm
Published 2016“…Previous works of self-charging algorithms were focused only for steady-state operation by using either proportional-integral (PI) or fuzzy logic control (FLC). …”
Get full text
Get full text
Get full text
Article -
11
An improved self organizing map using jaccard new measure for textual bugs data clustering
Published 2018“…Considering the unsupervised learning algorithms, Self-Organizing Map (SOM) considers the equally compatible algorithm for clustering, as both algorithms are closely related but different in way they were used in data mining. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
12
An improved self organizing map using jaccard new measure for textual bugs data clustering
Published 2018“…Considering the unsupervised learning algorithms, SelfOrganizing Map (SOM) considers the equally compatible algorithm for clustering, as both algorithms are closely related but different in way they were used in data mining. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
13
PID Tuning Method Using Chaotic Safe Experimentation Dynamics Algorithm for Elastic Joint Manipulator
Published 2021“…CSEDA was a modified version of the safe experimentation dynamics algorithm (SEDA) that used a chaos function in the updated equation. …”
Get full text
Get full text
Get full text
Article -
14
The use of SOM for fingerprint classification
Published 2023“…This paper introduces an approach to fingerprint classification by using Self-Organizing Maps (SOM). In order to be able to deal with fingerprint images having distorted regions, the SOM learning and classification algorithms are modified. …”
Conference paper -
15
Self-calibration algorithm for a pressure sensor with a real-time approach based on an artificial neural network
Published 2018“…To verify the proposed model’s capability to build a self-calibration algorithm, the model was tested using an untrained input data set. …”
Get full text
Get full text
Get full text
Article -
16
An efficient fault syndromes simulator for SRAM memories
Published 2009“…At present, March test algorithm is used to detect and diagnose all faults related to Random Access Memories. …”
Get full text
Get full text
Get full text
Article -
17
Photovoltaic shunt active power filter based on indirect self-charging with step size error cancellation and simplified adaptive linear neuron
Published 2017“…In the indirect self-charging with step size error cancellation, a new technique has been introduced in operation of the self-charging algorithm, known later as indirect control technique. …”
Get full text
Get full text
Thesis -
18
DC-link capacitor voltage control for single-phase shunt active power filter with step size error cancellation in self-charging algorithm
Published 2016“…Previous works of self-charging algorithms were focused only for steady-state operation by using either proportional-integral (PI) or fuzzy logic control (FLC). …”
Get full text
Get full text
Article -
19
SA-EVPS ALGORITHM FOR DISCRETE SIZE OPTIMIZATION OF THE 582-BAR SPATIAL TRUSS STRUCTURE
Published 2023“…Nowadays, approximate optimization methods are widely used. This study utilized the Self Adaptive Enhanced Vibrating Particle System (SA-EVPS) algorithm as an approximate optimization method, since the EVPS algorithm requires experimental parameters. …”
Get full text
Get full text
Article -
20
Design of QFT-based self-tuning deadbeat controller
Published 2013“…This paper presents a design method of self-tuning Quantitative Feedback Theory (QFT) by using improved deadbeat control algorithm. …”
Get full text
Get full text
Get full text
Article
