Search Results - (( protocol directed learning algorithm ) OR ( java application tree algorithm ))

  • Showing 1 - 15 results of 15
Refine Results
  1. 1
  2. 2

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Spatio-temporal event association using reward-modulated spike-time-dependent plasticity by Yusoff, Nooraini, Ibrahim, Mohammed Fadhil

    Published 2018
    “…For goal-directed learning in spiking neural networks, target spike templates are usually required.Optimal performance is achieved by minimising the error between the desired and output spike timings.However, in some dynamic environments, a set of learning targets with precise encoding is not always available.For this study, we associate a pair of spatio-temporal events with a target response using a reinforcement learning approach.The learning is implemented in a recurrent spiking neural network using reward-modulated spike-time-dependent plasticity.The learning protocol is simple and inspired by a behavioural experiment from a neuropsychology study.For a goal-directed application, learning does not require a target spike template.In this study, convergence is measured by synchronicity of activities in associated neuronal groups.As a result of learning, a network is able to associate a pair of events with a temporal delay in a dynamic setting. …”
    Get full text
    Get full text
    Article
  4. 4
  5. 5

    Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde by Ogunfolajin Maruff , Tunde

    Published 2022
    “…This thesis is based on the application of sentiment classification algorithm to tweet data with the goal of classifying messages based on the polarity of sentiment towards a particular topic (or subject matter). …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Distributed denial of service attack in HTTP/2: review on security issues and future challenges by Liang Ming, Leau, Yu-Beng, Ying Xie

    Published 2024
    “…Additionally, it highlights the potential applicability of deep learning algorithms in the context of the HTTP/2 protocol. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Intrusion Detection in Mobile Ad Hoc Networks Using Transductive Machine Learning Techniques by Farhan, Farhan Abdel-Fattah Ahmad

    Published 2011
    “…In machine learning algorithm, choosing the most relevant features for each attack is a very important requirement, especially in mobile ad hoc networks where the network topology dynamically changes. …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    Mining Sequential Patterns Using I-PrefixSpan by Dhany , Saputra, Rambli Dayang, R.A., Foong, Oi Mean

    Published 2007
    “…In this paper, we propose an improvement of pattern growth-based PrefixSpan algorithm, called I-PrefixSpan. The general idea of I-PrefixSpan is to use the efficient data structure for general tree-like framework and separator database to reduce the execution time and memory usage. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    A review of deep learning-based defect detection and panel localization for photovoltaic panel surveillance system by Mohamed Ameerdin, Muhammad Irshat, Jamaluddin, Muhammad Herman, Shukor, Ahmad Zaki, Mohamad, Syazwani

    Published 2024
    “…This review introduces an integrated deep learning framework that leverages Convolutional Neural Networks (CNNs), Recurrent Neural Networks (RNNs), and You Only Look Once (YOLO) algorithms to enhance defect detection in solar panels. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    AI powered asthma prediction towards treatment formulation: an android app approach by Murad, Saydul Akbar, Adhikary, Apurba, Md Muzahid, Abu Jafar, Sarker, Md Murad Hossain, Khan, Md. Ashikur Rahman, Hossain, Md. Bipul, Bairagi, Anupam Kumar, Masud, Mehedi, Kowsher, Md

    Published 2022
    “…We utilized eight robust machine learning algorithms to analyze this dataset. We found that the Decision tree classifier had the best performance, out of the eight algorithms, with an accuracy of 87%. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Energy efficient cluster head distribution in wireless sensor networks by Siew, Zhan Wei

    Published 2013
    “…PSO is lightweight heuristic optimization algorithm with each CH will move towards the best solutions by individual interaction with one another while learning from their own experience. …”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    AI powered asthma prediction towards treatment formulation : An android app approach by Murad, Saydul Akbar, Adhikary, Apurba, Muzahid, Abu Jafar Md, Sarker, Md. Murad Hossain, Khan, Md. Ashikur Rahman, Hossain, Md. Bipul, Bairagi, Anupam Kumar, Masud, Mehedi, Kowsher, Md.

    Published 2022
    “…We utilized eight robust machine learning algorithms to analyze this dataset. We found that the Decision tree classifier had the best performance, out of the eight algorithms, with an accuracy of 87%. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Comparative evaluation of anomaly-based controller area network IDS by Sharmin, Shaila, Mansor, Hafizah, Abdul Kadir, Andi Fitriah, Abdul Aziz, Normaziah

    Published 2023
    “…This work contributes to these efforts by reporting results of the comparative evaluation of four statistical and two machine learning-based CAN intrusion detection algorithm, against the Real ORNL Automotive Dynamometer (ROAD) CAN intrusion dataset. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  14. 14

    Advancements in battery technologies and management systems for electric vehicles A mini-review by Shanmuganathan, Elengespwaran, Norazlianie, Sazali, Kettner, Maurice, Salim, Naqib, Ismayuzri, Ishak

    Published 2025
    “…Additionally, the role of simulation tools such as Simulink in evaluating various charging methodologies is discussed, highlighting their significance in optimizing charging protocols. The review also examines developments in direct current (DC) fast charging infrastructure, including technologies such as Tesla’s Superchargers and AVL’s advanced charging solutions, which aim to provide rapid and efficient charging while addressing thermal and electrochemical challenges. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Incremental learning for large-scale stream data and its application to cybersecurity by Ali, Siti Hajar Aminah

    Published 2015
    “…To process large-scale data sequences, it is important to choose a suitable learning algorithm that is capable to learn in real time. …”
    Get full text
    Get full text
    Thesis