Search Results - (( solution constructive learning algorithm ) OR ( java implementation during algorithm ))
Search alternatives:
- solution constructive »
- constructive learning »
- implementation during »
- java implementation »
- learning algorithm »
- during algorithm »
-
1
Pairwise testing tools based on hill climbing algorithm (PTCA)
Published 2014“…The actual implementation of the algorithm which is in Java programming language, the program is implemented on Net Bean 7.0.1. …”
Get full text
Get full text
Undergraduates Project Papers -
2
A Hybrid of Ant Colony Optimization Algorithm and Simulated Annealing for Classification Rules
Published 2013“…The algorithm fixes the class before rule's construction. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
3
Feedforward neural network for solving particular fractional differential equations
Published 2024“…Then, a single hidden layer of FNN based on Chelyshkov polynomials with an extreme learning machine algorithm (SHLFNNCP-ELM) is constructed for solving FDEsC. …”
Get full text
Get full text
Get full text
Thesis -
4
A Chaotic Teaching Learning Based Optimization Algorithm for Optimization Emergency Flood Evacuation Routing
Published 2016“…Addressing this issue, this paper proposes the adoption and enhancement of the meta-heuristic algorithm, called Teaching Learning based Optimization (TLBO), to optimize the flood evacuation routing. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
An Improved Ensemble Deep Learning Model Based on CNN for Malicious Website Detection
Published 2023Conference Paper -
6
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…The circuits have been designed by proteus, the microcontrollers have been programmed by micro C, and the Graphical User Interface (GUI) has been implemented in Java. Few by electronic components such as RFID, multiplexer, XBee, and servo motors have been used to realize the system. …”
Get full text
Get full text
Thesis -
7
A Study on Abstract Policy for Acceleration of Reinforcement Learning
Published 2014“…In this paper, the authors propose to reuse an abstract policy, a representative of a solution constructed by learning vector quantization (LVQ) algorithm, to improve initial performance of an RL learner in a similar but different problem. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
8
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…The proposed security architecture is constructed as an adaptive way-forward Internet-of-Things (IoT) friendly security solution that is comprised of three cyclic parts: learn, predict and prevent. …”
Get full text
Get full text
Article -
9
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…The proposed security architecture is constructed as an adaptive way-forward Internet-of-Things (IoT) friendly security solution that is comprised of three cyclic parts: learn, predict and prevent. …”
Get full text
Get full text
Article -
10
Implementing BiSM and CCL algorithm for managing audio storage
Published 2012“…Therefore, this paper analyzed the issues and proposed a solution to manage the audio storage.The elements from biological inspired components were studied and identified to seek for the requirements of Bio-Inspired Storing Model (BiSM).Then a structural architecture of BiSM was designed in addition the Cognitive and Constructive Learning (CCL) algorithm was proposed.Finally, BiSM and CCL algorithm were evaluated with exemplar application settings and the results were presented in a case study of MP3 music collections.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
11
-
12
Theory-guided machine learning for predicting and minimising surface settlement caused by the excavation of twin tunnels / Chia Yu Huat
Published 2024“…In response to worsening urban traffic congestion, metro tunnels have emerged as a solution to ease pressure on road networks. Shield machines, like earth pressure balance and slurry machines, are pivotal in modern tunnel construction. …”
Get full text
Get full text
Get full text
Thesis -
13
Parameter Estimation of Lorenz Attractor: A Combined Deep Neural Network and K-Means Clustering Approach
Published 2022“…This study constructs the flow of DNN based method with the K-Means algorithm. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
14
Talkout : Protecting mental health application with a lightweight message encryption
Published 2022“…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
Get full text
Get full text
Get full text
Academic Exercise -
15
Deep continual learning for predicting blast-induced overbreak in tunnel construction / He Biao
Published 2024“…The achievements of this thesis indicate a substantial step forward in the application of deep continual learning in tunnel blasting. This thesis offers a promising solution to the longstanding challenge of blast-induced overbreak. …”
Get full text
Get full text
Get full text
Thesis -
16
A robust firefly algorithm with backpropagation neural networks for solving hydrogeneration prediction
Published 2018“…Second, it is to construct on this method to improve an efficient process for prediction problems that can discover efficient solutions at a high speed of convergence. …”
Get full text
Get full text
Get full text
Get full text
Article -
17
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…The system is capable in operating an off-line programming method, starting from its programming sequences until robotic implementation of the program. During early stages, the research is emphasis more towards designing a robotic system using RoboLab software and C++ programming language. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
18
Malicious URL Detection with Distributed Representation and Deep Learning
Published 2023Conference Paper -
19
-
20
A multi-depot vehicle routing problem with stochastic road capacity and reduced two-stage stochastic integer linear programming models for rollout algorithm
Published 2021“…The proposed approach is suitable for obtaining a policy constructed dynamically on the go during the rollout algorithm. …”
Get full text
Get full text
Article
