Search Results - (( protocol directed learning algorithm ) OR ( java application bees algorithm ))

  • Showing 1 - 8 results of 8
Refine Results
  1. 1

    Spatio-temporal event association using reward-modulated spike-time-dependent plasticity by Yusoff, Nooraini, Ibrahim, Mohammed Fadhil

    Published 2018
    “…For goal-directed learning in spiking neural networks, target spike templates are usually required.Optimal performance is achieved by minimising the error between the desired and output spike timings.However, in some dynamic environments, a set of learning targets with precise encoding is not always available.For this study, we associate a pair of spatio-temporal events with a target response using a reinforcement learning approach.The learning is implemented in a recurrent spiking neural network using reward-modulated spike-time-dependent plasticity.The learning protocol is simple and inspired by a behavioural experiment from a neuropsychology study.For a goal-directed application, learning does not require a target spike template.In this study, convergence is measured by synchronicity of activities in associated neuronal groups.As a result of learning, a network is able to associate a pair of events with a temporal delay in a dynamic setting. …”
    Get full text
    Get full text
    Article
  2. 2

    Distributed denial of service attack in HTTP/2: review on security issues and future challenges by Liang Ming, Leau, Yu-Beng, Ying Xie

    Published 2024
    “…Additionally, it highlights the potential applicability of deep learning algorithms in the context of the HTTP/2 protocol. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Intrusion Detection in Mobile Ad Hoc Networks Using Transductive Machine Learning Techniques by Farhan, Farhan Abdel-Fattah Ahmad

    Published 2011
    “…In machine learning algorithm, choosing the most relevant features for each attack is a very important requirement, especially in mobile ad hoc networks where the network topology dynamically changes. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    A review of deep learning-based defect detection and panel localization for photovoltaic panel surveillance system by Mohamed Ameerdin, Muhammad Irshat, Jamaluddin, Muhammad Herman, Shukor, Ahmad Zaki, Mohamad, Syazwani

    Published 2024
    “…This review introduces an integrated deep learning framework that leverages Convolutional Neural Networks (CNNs), Recurrent Neural Networks (RNNs), and You Only Look Once (YOLO) algorithms to enhance defect detection in solar panels. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Energy efficient cluster head distribution in wireless sensor networks by Siew, Zhan Wei

    Published 2013
    “…PSO is lightweight heuristic optimization algorithm with each CH will move towards the best solutions by individual interaction with one another while learning from their own experience. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Comparative evaluation of anomaly-based controller area network IDS by Sharmin, Shaila, Mansor, Hafizah, Abdul Kadir, Andi Fitriah, Abdul Aziz, Normaziah

    Published 2023
    “…This work contributes to these efforts by reporting results of the comparative evaluation of four statistical and two machine learning-based CAN intrusion detection algorithm, against the Real ORNL Automotive Dynamometer (ROAD) CAN intrusion dataset. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  7. 7

    Advancements in battery technologies and management systems for electric vehicles A mini-review by Shanmuganathan, Elengespwaran, Norazlianie, Sazali, Kettner, Maurice, Salim, Naqib, Ismayuzri, Ishak

    Published 2025
    “…Additionally, the role of simulation tools such as Simulink in evaluating various charging methodologies is discussed, highlighting their significance in optimizing charging protocols. The review also examines developments in direct current (DC) fast charging infrastructure, including technologies such as Tesla’s Superchargers and AVL’s advanced charging solutions, which aim to provide rapid and efficient charging while addressing thermal and electrochemical challenges. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Incremental learning for large-scale stream data and its application to cybersecurity by Ali, Siti Hajar Aminah

    Published 2015
    “…To process large-scale data sequences, it is important to choose a suitable learning algorithm that is capable to learn in real time. …”
    Get full text
    Get full text
    Thesis