Search Results - (( protocol directed learning algorithm ) OR ( java application tree algorithm ))
Search alternatives:
- learning algorithm »
- protocol directed »
- java application »
- application tree »
- tree algorithm »
-
1
-
2
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
Get full text
Get full text
Get full text
Article -
3
Spatio-temporal event association using reward-modulated spike-time-dependent plasticity
Published 2018“…For goal-directed learning in spiking neural networks, target spike templates are usually required.Optimal performance is achieved by minimising the error between the desired and output spike timings.However, in some dynamic environments, a set of learning targets with precise encoding is not always available.For this study, we associate a pair of spatio-temporal events with a target response using a reinforcement learning approach.The learning is implemented in a recurrent spiking neural network using reward-modulated spike-time-dependent plasticity.The learning protocol is simple and inspired by a behavioural experiment from a neuropsychology study.For a goal-directed application, learning does not require a target spike template.In this study, convergence is measured by synchronicity of activities in associated neuronal groups.As a result of learning, a network is able to associate a pair of events with a temporal delay in a dynamic setting. …”
Get full text
Get full text
Article -
4
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
5
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…This thesis is based on the application of sentiment classification algorithm to tweet data with the goal of classifying messages based on the polarity of sentiment towards a particular topic (or subject matter). …”
Get full text
Get full text
Get full text
Thesis -
6
Distributed denial of service attack in HTTP/2: review on security issues and future challenges
Published 2024“…Additionally, it highlights the potential applicability of deep learning algorithms in the context of the HTTP/2 protocol. …”
Get full text
Get full text
Get full text
Get full text
Article -
7
Intrusion Detection in Mobile Ad Hoc Networks Using Transductive Machine Learning Techniques
Published 2011“…In machine learning algorithm, choosing the most relevant features for each attack is a very important requirement, especially in mobile ad hoc networks where the network topology dynamically changes. …”
Get full text
Get full text
Get full text
Thesis -
8
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…In this paper, we propose an improvement of pattern growth-based PrefixSpan algorithm, called I-PrefixSpan. The general idea of I-PrefixSpan is to use the efficient data structure for general tree-like framework and separator database to reduce the execution time and memory usage. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
9
A review of deep learning-based defect detection and panel localization for photovoltaic panel surveillance system
Published 2024“…This review introduces an integrated deep learning framework that leverages Convolutional Neural Networks (CNNs), Recurrent Neural Networks (RNNs), and You Only Look Once (YOLO) algorithms to enhance defect detection in solar panels. …”
Get full text
Get full text
Get full text
Get full text
Article -
10
AI powered asthma prediction towards treatment formulation: an android app approach
Published 2022“…We utilized eight robust machine learning algorithms to analyze this dataset. We found that the Decision tree classifier had the best performance, out of the eight algorithms, with an accuracy of 87%. …”
Get full text
Get full text
Get full text
Article -
11
Energy efficient cluster head distribution in wireless sensor networks
Published 2013“…PSO is lightweight heuristic optimization algorithm with each CH will move towards the best solutions by individual interaction with one another while learning from their own experience. …”
Get full text
Get full text
Get full text
Thesis -
12
AI powered asthma prediction towards treatment formulation : An android app approach
Published 2022“…We utilized eight robust machine learning algorithms to analyze this dataset. We found that the Decision tree classifier had the best performance, out of the eight algorithms, with an accuracy of 87%. …”
Get full text
Get full text
Get full text
Article -
13
Comparative evaluation of anomaly-based controller area network IDS
Published 2023“…This work contributes to these efforts by reporting results of the comparative evaluation of four statistical and two machine learning-based CAN intrusion detection algorithm, against the Real ORNL Automotive Dynamometer (ROAD) CAN intrusion dataset. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
14
Advancements in battery technologies and management systems for electric vehicles A mini-review
Published 2025“…Additionally, the role of simulation tools such as Simulink in evaluating various charging methodologies is discussed, highlighting their significance in optimizing charging protocols. The review also examines developments in direct current (DC) fast charging infrastructure, including technologies such as Tesla’s Superchargers and AVL’s advanced charging solutions, which aim to provide rapid and efficient charging while addressing thermal and electrochemical challenges. …”
Get full text
Get full text
Get full text
Article -
15
Incremental learning for large-scale stream data and its application to cybersecurity
Published 2015“…To process large-scale data sequences, it is important to choose a suitable learning algorithm that is capable to learn in real time. …”
Get full text
Get full text
Thesis
