Search Results - learning object (differences OR difference) ((encryption algorithm) OR (evolution algorithm))

Search alternatives:

  • Showing 1 - 4 results of 4
Refine Results
  1. 1

    Development of a Bioinspired optimization algorithm for the automatic generation of multiple distinct behaviors in simulated mobile robots by Hanafi Ahmad Hijazi, Patricia Anthony

    Published 2006
    “…This research explores a new approach of using a multi-objective evolutionary algorithm (MOEA) to evolve robot controllers in performing phototaxis tasks while avoiding obstacles in a simulated 30 physics environment, to overcome problems involving more than one objective, where these objectives usually trade-off among each other and are expressed in different units. …”
    Get full text
    Get full text
    Research Report
  2. 2

    Automating commercial video game development using computational intelligence by Tse, Guan Tan, Teo, Jason Tze Wi, Patricia Anthony

    Published 2011
    “…Pac-man. The resulting algorithm is referred to as an Evolution Strategies Neural Network or ESNet. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Deep learning detector for pests and plant disease recognition by Ileladewa, Oluwatimilehin Adekunle

    Published 2020
    “…And developing a quick and accurate model could help in detecting pests and diseases in plants. Meanwhile, evolution in deep convolutional neural networks for image classification has rapidly improved the accuracy of object detection, classification and system recognition. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  4. 4

    Privacy optimization and intrusion detection in modbus/tcp network-based scada in water distribution systems by Franco, Daniel Jose Da Graca Peceguina

    Published 2021
    “…Another problematic aspect is related to the intrusion detection solutions that are based on machine learning cluster algorithms to learn systems’ specifications and extract general state-based rules for attacks identification. …”
    Get full text
    Get full text
    Thesis