Search Results - (( knowledge training based algorithm ) OR ( java application customization algorithm ))
Search alternatives:
- customization algorithm »
- knowledge training »
- java application »
- training based »
-
1
Knowledge base processing method based on text classification algorithm
Published 2023“…The text classification algorithm's knowledge base processing method utilizes existing data from the knowledge base to guide the construction and training of the classification model. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
2
REDUCING LATENCY IN A VIRTUAL REALITY-BASED TRAINING APPLICATION
Published 2006“…Findings indicated that heuristic-based algorithm is an accurate prediction method to compensate latency in virtual training. …”
Get full text
Get full text
Thesis -
3
Enhanced Model Compression for Lipreading Recognition based on Knowledge Distillation Algorithm
Published 2025“…Therefore, three knowledge distillation compression algorithms are proposed in this paper: Three different knowledge distillation compression algorithms, an offline model compression algorithm based on multi-feature transfer (MTOF), an online model compression algorithm based on adversarial learning (ALON), and an online model compression algorithm based on consistent regularization(CRON) to complete the compression of the Chinese character sequence output by the model. …”
Get full text
Get full text
Get full text
Get full text
Article -
4
Advancements and challenges in mobile robot navigation: a comprehensive review of algorithms and potential for self-learning approaches
Published 2024“…The findings also insinuate that in the domain of machine learning-based algorithms, integration of knowledge representation with a neuro-symbolic approach has the capacity to improve the accuracy and performance of self-robot navigation training by a significant margin.…”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
5
An initial state of design and development of intelligent knowledge discovery system for stock exchange database
Published 2004“…Generally our clustering algorithm consists of two steps including training and running steps.The training step is conducted for generating the neural network knowledge based on clustering.In running step, neural network knowledge based is used for supporting the Module in order to generate learned complete data, transformed data and interesting clusters that will help to generate interesting rules.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
6
Hyper-heuristic approaches for data stream-based iIntrusion detection in the Internet of Things
Published 2022“…The system trains the NN on previously labelled data, and its knowledge is used to calculate the core online-offline clustering block error. …”
Get full text
Get full text
Thesis -
7
Development of Machine Learning Algorithm for Acquiring Machining Data in Turning Process
Published 2004“…The design network is trained by presenting several target machining data that the network must learn according to a learning rule (algorithm). …”
Get full text
Get full text
Thesis -
8
Application Of Multi-Layer Perceptron Technique To Detect And Locate The Base Of A Young Corn Plant
Published 2007“…In this research, a vision system algorithm has been developed to identify and locate base of young corn trees based upon robot vision technology, pattern recognition techniques, and knowledge-based decision theory. …”
Get full text
Get full text
Thesis -
9
-
10
Coalition of genetic algorithms and artificial neural network for isolated spoken Malay speech recognition / Noraini Seman
Published 2012“…However, traditional ANNs have many fundamental problems regarding a long and uncertain training process, which in most cases learning or training of a neural network is based on a trial and error method. …”
Get full text
Get full text
Book Section -
11
DATA CLASSIFICATION SYSTEM WITH FUZZY NEURAL BASED APPROACH
Published 2005“…Lying hidden in all this data is potentially useful information that is rarely made explicit or taken advantage. New tools based both on clever applications of established algorithms and on new methodologies, empower us to do entirely new things. …”
Get full text
Get full text
Final Year Project -
12
Research on the construction of an efficient and lightweight online detection method for tiny surface defects through model compression and knowledge distillation
Published 2024“…In response to the current issues of poor real-time performance, high computational costs, and excessive memory usage of object detection algorithms based on deep convolutional neural networks in embedded devices, a method for improving deep convolutional neural networks based on model compression and knowledge distillation is proposed. …”
Get full text
Get full text
Article -
13
Hybrid histogram and neural based call admission control for VBR video traffic.
“…We have shown how performance data derived from histogram based approach can be used as training data in the NN training scheme to produce even better results than the pure histogram based approach, while still retaining the merits of it.…”
Get full text
Conference or Workshop Item -
14
Static image of hand gesture for numerical sign language recognition system using backfrofagation neural network / Erman Ibrahim
Published 2007“…The useful information will be fed to the ANN whereby the BP training algorithm will be performed in order to extract the knowledge of the image that is the final weight. …”
Get full text
Thesis -
15
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
Get full text
Get full text
Thesis -
16
Unsupervised Anomaly Detection with Unlabeled Data Using Clustering
Published 2005“…We present a clustering-based intrusion detection algorithm, unsupervised anomaly detection, which trains on unlabeled data in order to detect new intrusions. …”
Get full text
Get full text
Conference or Workshop Item -
17
Recognition of isolated elements picture using backpropagation neural network / Melati Sabtu
Published 2005“…The methodology used in the development of this project is basically based on the eight major steps. There are problem assessment, data acquisition, cropping, pre-processing, design, training, testing and documentation. …”
Get full text
Get full text
Thesis -
18
Fish Motion Trajectories Detection Algorithm Based on Spiking Neural Network (S/O: 12893)
Published 2017“…The algorithm for this learning model adopted the reward-modulated STDP. …”
Get full text
Get full text
Monograph -
19
What, how and when to use knowledge in neural network application
Published 2004“…These weights are assigned randomly or generated using other procedures such as Nguyen-Widrow initialization algorithm. After training, the weights are stored and recalled in application phase. …”
Get full text
Get full text
Conference or Workshop Item -
20
