Search Results - data distribution ((((function algorithm) OR (recognition algorithm))) OR (detection algorithm))

Refine Results
  1. 1
  2. 2
  3. 3

    Enhanced Q-Learning algorithm for potential actions selection in automated graphical user interface testing by Goh, Kwang Yi

    Published 2023
    “…Furthermore, the proposed techniques based on the QLearning algorithm do not consider context-based actions. Thus, these techniques are unable to detect failures that occur due to the improper use of context data, which is becoming an increasingly common issue in mobile applications nowadays. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    Parameter estimation and outlier detection for some types of circular model / Siti Zanariah binti Satari by Satari, Siti Zanariah

    Published 2015
    “…Lastly, we consider the problem of detecting multiple outliers in circular regression models based on the clustering algorithm. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Vibration-based structural damage detection and system identification using wavelet multiresolution analysis / Seyed Alireza Ravanfar by Seyed Alireza, Ravanfar

    Published 2017
    “…To improve the proposed algorithm, GA was utilized to identify the best choice for ‘‘mother wavelet function” and “decomposition level” of the signals by means of the fundamental fitness function. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Improving the exploration strategy of an automated android GUI testing tool based on the Q-Learning algorithm by selecting potential actions by Goh, Kwang Yi, Baharom, Salmi, Din, Jamilah

    Published 2022
    “…We utilise the Q-Learning algorithm to compare actions, including context-based actions, to effectively detect crashes and achieve a higher code coverage.…”
    Get full text
    Get full text
    Article
  7. 7

    Intelligent image noise types recognition and denoising system using deep learning / Khaw Hui Ying by Khaw , Hui Ying

    Published 2019
    “…In order to reduce the training time and computational cost of the algorithm, Principal Components Analysis (PCA) pretraining strategy is deployed to obtain data adaptive filter banks. …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9

    ETERS: A comprehensive energy aware trust-based efficient routing scheme for adversarial WSNs by Khan, T., Singh, K., Hasan, M.H., Ahmad, K., Reddy, G.T., Mohan, S., Ahmadian, A.

    Published 2021
    “…However, a trust-based attack detection algorithm (TADA) assesses the reliability of SNs to detect internal attacks. …”
    Get full text
    Get full text
    Article
  10. 10
  11. 11
  12. 12

    Research on the construction of an efficient and lightweight online detection method for tiny surface defects through model compression and knowledge distillation by Chen, Qipeng, Xiong, Qiaoqiao, Huang, Haisong, Tang, Saihong, Liu, Zhenghong

    Published 2024
    “…In response to the current issues of poor real-time performance, high computational costs, and excessive memory usage of object detection algorithms based on deep convolutional neural networks in embedded devices, a method for improving deep convolutional neural networks based on model compression and knowledge distillation is proposed. …”
    Get full text
    Get full text
    Article
  13. 13
  14. 14
  15. 15

    A new classifier based on combination of genetic programming and support vector machine in solving imbalanced classification problem by Mohd Pozi, Muhammad Syafiq

    Published 2016
    “…However, by changing the distribution of both classes, the original classes distribution that are followed by that particular data will be violated. …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    Customized fault management system for low distribution automation system by Ahmed, Musse Mohamud, Soo, W. L.

    Published 2008
    “…The laboratory results are compared with the simulation results to make the final conclusion of the algorithm function properly.…”
    Get full text
    Get full text
    Proceeding Paper
  17. 17

    Measuring height of high-voltage transmission poles using unmanned aerial vehicle (UAV) imagery by Qayyum, A., Malik, A.S., Saad, N.M., bin Abdullah, M.F., Iqbal, M., Rasheed, W., Bin Ab Abdullah, A.R., Hj Jaafar, M.Y.

    Published 2017
    “…The proposed solution introduces and integrates ordering constraints along with a submodular energy minimisation function to/with the GC algorithm to enhance performance. …”
    Get full text
    Get full text
    Article
  18. 18

    Potential issues in novel computational research: artificial immune systems by Iqbal, Anjum, Maarof, Mohd. Aizaini

    Published 2003
    “…AIS is growing as a core paradigm for a wide application area including: intrusion detection, data analysis, pattern recognition, optimization, robotics, distributed control, and bioinformatics etc. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19

    A Symbol Recognition System for Single-Line Diagrams Developed Using a Deep-Learning Approach by Bhanbhro, H., Kwang Hooi, Y., Kusakunniran, W., Amur, Z.H.

    Published 2023
    “…Featured Application: The present study is among the first research efforts to generate augmented datasets of complex single-line diagrams to detect symbols using deep-learning-based algorithms. …”
    Get full text
    Get full text
    Article
  20. 20

    Development of Intelligent Leak Detection System Based on Artificial Pressure Transient Signal Using Integrated Kurtosis-Based Algorithm for Z-Filter Technique (I-Kaz) / Hanafi.M.Y... by M.Yusop, Hanafi, Ghazali, M.F., M.Yusof, M.F., W.Hamat, W.S.

    Published 2017
    “…HHT is a way to decompose a signal into intrinsic mode function (IMF). However, this method has the difficulty in selecting the suitable IMF for the next data post-processing method which is Hilbert Transform (HT). …”
    Get full text
    Get full text
    Article