Search Results - (( knowledge training based algorithm ) OR ( java application customization algorithm ))

Refine Results
  1. 1

    Knowledge base processing method based on text classification algorithm by Baisheng Zhong, Mohd Shamrie Sainin, Tan Soo Fun

    Published 2023
    “…The text classification algorithm's knowledge base processing method utilizes existing data from the knowledge base to guide the construction and training of the classification model. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2

    REDUCING LATENCY IN A VIRTUAL REALITY-BASED TRAINING APPLICATION by P ISKANDAR, YULITA HANUM

    Published 2006
    “…Findings indicated that heuristic-based algorithm is an accurate prediction method to compensate latency in virtual training. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Enhanced Model Compression for Lipreading Recognition based on Knowledge Distillation Algorithm by Qianru, Lu, Kuryati, Kipli, Tengku Mohd Afendi, Zulcaffle, Yuan, Liu, Xiangju, Liu, Bo, Wang

    Published 2025
    “…Therefore, three knowledge distillation compression algorithms are proposed in this paper: Three different knowledge distillation compression algorithms, an offline model compression algorithm based on multi-feature transfer (MTOF), an online model compression algorithm based on adversarial learning (ALON), and an online model compression algorithm based on consistent regularization(CRON) to complete the compression of the Chinese character sequence output by the model. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Advancements and challenges in mobile robot navigation: a comprehensive review of algorithms and potential for self-learning approaches by Al Mahmud, Suaib, Kamarulariffin, Abdurrahman, Mohd Ibrahim, Azhar, Haja Mohideen, Ahmad Jazlan

    Published 2024
    “…The findings also insinuate that in the domain of machine learning-based algorithms, integration of knowledge representation with a neuro-symbolic approach has the capacity to improve the accuracy and performance of self-robot navigation training by a significant margin.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    An initial state of design and development of intelligent knowledge discovery system for stock exchange database by Che Mat @ Mohd Shukor, Zamzarina, Khokhar, Rashid Hafeez, Md Sap, Mohd Noor

    Published 2004
    “…Generally our clustering algorithm consists of two steps including training and running steps.The training step is conducted for generating the neural network knowledge based on clustering.In running step, neural network knowledge based is used for supporting the Module in order to generate learned complete data, transformed data and interesting clusters that will help to generate interesting rules.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    Hyper-heuristic approaches for data stream-based iIntrusion detection in the Internet of Things by Hadi, Ahmed Adnan

    Published 2022
    “…The system trains the NN on previously labelled data, and its knowledge is used to calculate the core online-offline clustering block error. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Development of Machine Learning Algorithm for Acquiring Machining Data in Turning Process by Ali Al-Assadi, Hayder M. A.

    Published 2004
    “…The design network is trained by presenting several target machining data that the network must learn according to a learning rule (algorithm). …”
    Get full text
    Get full text
    Thesis
  8. 8

    Application Of Multi-Layer Perceptron Technique To Detect And Locate The Base Of A Young Corn Plant by Morshidi, Malik Arman

    Published 2007
    “…In this research, a vision system algorithm has been developed to identify and locate base of young corn trees based upon robot vision technology, pattern recognition techniques, and knowledge-based decision theory. …”
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10

    Coalition of genetic algorithms and artificial neural network for isolated spoken Malay speech recognition / Noraini Seman by Seman, Noraini

    Published 2012
    “…However, traditional ANNs have many fundamental problems regarding a long and uncertain training process, which in most cases learning or training of a neural network is based on a trial and error method. …”
    Get full text
    Get full text
    Book Section
  11. 11

    DATA CLASSIFICATION SYSTEM WITH FUZZY NEURAL BASED APPROACH by LUONG, TRUNG TUAN

    Published 2005
    “…Lying hidden in all this data is potentially useful information that is rarely made explicit or taken advantage. New tools based both on clever applications of established algorithms and on new methodologies, empower us to do entirely new things. …”
    Get full text
    Get full text
    Final Year Project
  12. 12

    Research on the construction of an efficient and lightweight online detection method for tiny surface defects through model compression and knowledge distillation by Chen, Qipeng, Xiong, Qiaoqiao, Huang, Haisong, Tang, Saihong, Liu, Zhenghong

    Published 2024
    “…In response to the current issues of poor real-time performance, high computational costs, and excessive memory usage of object detection algorithms based on deep convolutional neural networks in embedded devices, a method for improving deep convolutional neural networks based on model compression and knowledge distillation is proposed. …”
    Get full text
    Get full text
    Article
  13. 13

    Hybrid histogram and neural based call admission control for VBR video traffic. by Khalil, Ibrahim, Mohd Ali, Borhanuddin

    “…We have shown how performance data derived from histogram based approach can be used as training data in the NN training scheme to produce even better results than the pure histogram based approach, while still retaining the merits of it.…”
    Get full text
    Conference or Workshop Item
  14. 14

    Static image of hand gesture for numerical sign language recognition system using backfrofagation neural network / Erman Ibrahim by Ibrahim, Erman

    Published 2007
    “…The useful information will be fed to the ANN whereby the BP training algorithm will be performed in order to extract the knowledge of the image that is the final weight. …”
    Get full text
    Thesis
  15. 15

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Unsupervised Anomaly Detection with Unlabeled Data Using Clustering by Chimphlee, Witcha, Abdullah, Abdul Hanan, Md. Sap, Mohd. Noor

    Published 2005
    “…We present a clustering-based intrusion detection algorithm, unsupervised anomaly detection, which trains on unlabeled data in order to detect new intrusions. …”
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17

    Recognition of isolated elements picture using backpropagation neural network / Melati Sabtu by Sabtu, Melati

    Published 2005
    “…The methodology used in the development of this project is basically based on the eight major steps. There are problem assessment, data acquisition, cropping, pre-processing, design, training, testing and documentation. …”
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19

    What, how and when to use knowledge in neural network application by Wan Ishak, Wan Hussain, Abdul Rahman, Shuzlina

    Published 2004
    “…These weights are assigned randomly or generated using other procedures such as Nguyen-Widrow initialization algorithm. After training, the weights are stored and recalled in application phase. …”
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20