Search Results - (( structures perceptions learning algorithm ) OR ( java application modified algorithm ))

  • Showing 1 - 14 results of 14
Refine Results
  1. 1
  2. 2
  3. 3

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…A GUI is created in a form of JAVA application to display data detected from tag. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Automatic generation of content security policy to mitigate cross site scripting by Mhana, Samer Attallah, Din, Jamilah, Atan, Rodziah

    Published 2016
    “…The algorithm is implemented as a plugin. It does not interfere with the web application original code. …”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Deep reinforcement learning-based driving strategy for avoidance of chain collisions and its safety efficiency analysis in autonomous vehicles by Abu Jafar, Md Muzahid, Syafiq Fauzi, Kamarulzaman, Rahman, Md. Arafatur, Alenezi, Ali H.

    Published 2022
    “…To address this, A reward function is being developed to deal with the challenge of multiple vehicle collision avoidance. A perception network structure based on formation and on actor-critic methodologies is employed to enhance the decision-making process. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Deep reinforcement learning based driving strategy for avoidance of chain collisions and its safety efficiency analysis in autonomous vehicles by Abu Jafar, Md Muzahid, Syafiq Fauzi, Kamarulzaman, Rahman, Md. Arafatur, Alenezi, Ali H.

    Published 2022
    “…To address this, A reward function is being developed to deal with the challenge of multiple vehicle collision avoidance. A perception network structure based on formation and on actor-critic methodologies is employed to enhance the decision-making process. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7
  8. 8
  9. 9

    Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system by Beg, Abul Hashem

    Published 2011
    “…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Grammar-based prosody modification for explicit control Malay language storytelling speech synthesis / Muhammad Izzad Ramli by Ramli, Muhammad Izzad

    Published 2018
    “…Based on the prosody analysis, a grammar-based prosody modification rules are proposed by integrating grammatical structure. Consequently, new rules and algorithm that is MustFront rule, limitation rule, and two-steps pitch contour algorithm are introduced to increase the synthesized speech quality. …”
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12
  13. 13
  14. 14

    Application of artificial neural network in discriminating the agarwood oil quality using significant chemical compounds / Mohd Hezri Fazalul Rahiman … [et al.] by Rahiman, Mohd Hezri Fazalul, Ismail, Nurlaila, Taib, Mohd Nasir, Mohd Ali, Nor Azah, Tajuddin, Saiful Nizam

    Published 2014
    “…Data Processing - ANN Application ( Data pre-processing using Z-score, ANN design structure/architecture - parameter optimisation, training and testing the algorithm) Result & Discussion: ANN parameter optimisation - final error for learning rate, momentum rate and hidden layer size ANN final design parameter - Nodes in input layer: 7, Nodes in hidden layer size: 2, Output layer size: 1, learning rate: 0.9, Momentum rate: 0.7, Error goal: 0.01, Epochs: 100 ANN prediction: high accuracy for training and testing prediction (refer to the figure in poster) Patent & List of contributions: 1. …”
    Get full text
    Get full text
    Get full text
    Book Section