Search Results - (( protocol directed learning algorithm ) OR ( parallel optimization path algorithm ))*
Search alternatives:
- parallel optimization »
- learning algorithm »
- protocol directed »
- optimization path »
- path algorithm »
-
1
Tool path generation of contour parallel based on ant colony optimisation
Published 2016“…An Ant Colony Optimisation (ACO) method is used to optimize the tool path length because of its capability to find the shortest tool path length. …”
Get full text
Get full text
Article -
2
Minimizing machining airtime motion with an ant colony algorithm
Published 2016Get full text
Get full text
Article -
3
-
4
Restoration planning strategy of transmission system based on optimal energizing time of sectionalizing islands / Dian Najihah Abu Talib
Published 2019“…There are two discrete optimization techniques used in this work, which are the Artificial Bee Colony algorithm and Evolutionary Programming. …”
Get full text
Get full text
Get full text
Thesis -
5
A novel large-bit-size architecture and microarchitecture for the implementation of Superscalar Pipeline VLIW microprocessors
Published 2008“…Different adder architectures are investigated for suitability on synthesis implementation of large data bus size adder for efficient usage within the ALU. An adder algorithm using repetitive constructs in a parallel algorithm that allows for efficient and optimal synthesis for large data bus size is proposed as a suitable implementation for the adder within the ALU. …”
Get full text
Thesis -
6
Spatio-temporal event association using reward-modulated spike-time-dependent plasticity
Published 2018“…For goal-directed learning in spiking neural networks, target spike templates are usually required.Optimal performance is achieved by minimising the error between the desired and output spike timings.However, in some dynamic environments, a set of learning targets with precise encoding is not always available.For this study, we associate a pair of spatio-temporal events with a target response using a reinforcement learning approach.The learning is implemented in a recurrent spiking neural network using reward-modulated spike-time-dependent plasticity.The learning protocol is simple and inspired by a behavioural experiment from a neuropsychology study.For a goal-directed application, learning does not require a target spike template.In this study, convergence is measured by synchronicity of activities in associated neuronal groups.As a result of learning, a network is able to associate a pair of events with a temporal delay in a dynamic setting. …”
Get full text
Get full text
Article -
7
Distributed denial of service attack in HTTP/2: review on security issues and future challenges
Published 2024“…Additionally, it highlights the potential applicability of deep learning algorithms in the context of the HTTP/2 protocol. …”
Get full text
Get full text
Get full text
Get full text
Article -
8
Intrusion Detection in Mobile Ad Hoc Networks Using Transductive Machine Learning Techniques
Published 2011“…In machine learning algorithm, choosing the most relevant features for each attack is a very important requirement, especially in mobile ad hoc networks where the network topology dynamically changes. …”
Get full text
Get full text
Get full text
Thesis -
9
A 'snowflake' geometrical representation for optimised degree six 3-modified chordal ring networks
Published 2016“…A tree visualisation was constructed based on its connectivity to enable the generation of formulae for optimal diameter and average optimal path lengths. …”
Get full text
Get full text
Conference or Workshop Item -
10
Detection of black hole nodes in mobile ad hoc network using hybrid trustworthiness and energy consumption techniques
Published 2017“…In this thesis, a hybrid detection algorithm mechanism has been proposed which combines two detection algorithms based on nodes’ trustworthiness and energy consumption in a parallel manner in order to detect the black hole nodes. …”
Get full text
Get full text
Get full text
Thesis -
11
A review of deep learning-based defect detection and panel localization for photovoltaic panel surveillance system
Published 2024“…This review introduces an integrated deep learning framework that leverages Convolutional Neural Networks (CNNs), Recurrent Neural Networks (RNNs), and You Only Look Once (YOLO) algorithms to enhance defect detection in solar panels. …”
Get full text
Get full text
Get full text
Get full text
Article -
12
Energy efficient cluster head distribution in wireless sensor networks
Published 2013“…PSO is lightweight heuristic optimization algorithm with each CH will move towards the best solutions by individual interaction with one another while learning from their own experience. …”
Get full text
Get full text
Get full text
Thesis -
13
Online teleoperation of writing manipulator through graphics processing unit based accelerated stereo vision
Published 2021“…These algorithms are then parallelized using Compute Unified Device Architecture CUDA C language to run on Graphics Processing Unit GPU for hardware acceleration. …”
Get full text
Get full text
Thesis -
14
Comparative evaluation of anomaly-based controller area network IDS
Published 2023“…This work contributes to these efforts by reporting results of the comparative evaluation of four statistical and two machine learning-based CAN intrusion detection algorithm, against the Real ORNL Automotive Dynamometer (ROAD) CAN intrusion dataset. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
15
DC-based PV-powered home energy system
Published 2017“…A controller based on an algorithm of one time maximum power point (MPP) is proposed to mitigate those losses. …”
Get full text
Get full text
Thesis -
16
Advancements in battery technologies and management systems for electric vehicles A mini-review
Published 2025“…Additionally, the role of simulation tools such as Simulink in evaluating various charging methodologies is discussed, highlighting their significance in optimizing charging protocols. The review also examines developments in direct current (DC) fast charging infrastructure, including technologies such as Tesla’s Superchargers and AVL’s advanced charging solutions, which aim to provide rapid and efficient charging while addressing thermal and electrochemical challenges. …”
Get full text
Get full text
Get full text
Article -
17
Incremental learning for large-scale stream data and its application to cybersecurity
Published 2015“…To process large-scale data sequences, it is important to choose a suitable learning algorithm that is capable to learn in real time. …”
Get full text
Get full text
Thesis
