Search Results - (( data application testing algorithm ) OR ( based verification mining algorithm ))
Search alternatives:
- application testing »
- verification mining »
- based verification »
- testing algorithm »
- data application »
- mining algorithm »
-
1
Building norms-adaptable agents from Potential Norms Detection Technique (PNDT)
Published 2023“…The PNDT consists of five components: agent's belief base; observation process; Potential Norms Mining Algorithm (PNMA) to detect the potential norms and identify the normative protocol; verification process, which verifies the detected potential norms; and updating process, which updates the agent's belief base with new normative protocol. …”
Short Survey -
2
Dynamic and adaptive execution models for data stream mining applications in mobile edge cloud computing systems / Muhammad Habib Ur Rehman
Published 2016“…The critical factors of complexity at application level include data size and data rate of continuously streaming data, the selection of data fusion and data preprocessing methods, the choice of learning models, learning rates and learning modes, and the adoption of data mining algorithms. …”
Get full text
Get full text
Get full text
Thesis -
3
Development and implementation of a technique for norms-adaptable agents in open multi-agent communities
Published 2023“…Computer science; Systems science; Agent based simulation; Mining algorithms; Multi-agent community; nocv1; Normative agents; norms deatetcin; Norms detections; Third parties; Verification process; Multi agent systems…”
Article -
4
Development Of Analytical Solution For Thermo-Mechanical Stresses Of Multilayered Pressure Vessel Based On Recursive Algorithm
Published 2022Get full text
Get full text
Final Year Project / Dissertation / Thesis -
5
Building norms-adaptable agents from Potential Norms Detection Technique (PNDT)
Published 2013“…The PNDT consists of five components: agent’s belief base; observation process; Potential Norms Mining Algorithm (PNMA) to detect the potential norms and identify the normative protocol; verification process, which verifies the detected potential norms; and updating process, which updates the agent’s belief base with new normative protocol. …”
Get full text
Get full text
Article -
6
-
7
Fsm-Based Enhanced March C- Algorithm For Memory Built-In Self-Test
Published 2017Get full text
Get full text
Thesis -
8
-
9
Enhancement of bearing defect diagnosis via genetic algorithm optimized feature selection
Published 2015“…However the average classification accuracy of 84.74% on the unseen test data did not achieve the acceptable average success rate of 90% in this application. …”
Get full text
Get full text
Get full text
Thesis -
10
ANALYSIS AND INTERPRETATION OF PRESSURE TRANSIENT TEST DATA BY RECENT ROBUST DECONVOLUTION METHODS
Published 2013Get full text
Get full text
Final Year Project -
11
Fault detection with optimum March test algorithm
Published 2013Get full text
Get full text
Get full text
Article -
12
Randomness Tests On Nine Data Categories Of RECTANGLE Using NIST Statistical Test Suite
Published 2024Article -
13
Diabetes prediction system using clonal selection algorithm / Nor Aishah Mustapa
Published 2012“…The data included in the system is a tested and accurate data. …”
Get full text
Get full text
Thesis -
14
Parallelization of noise reduction algorithm for seismic data on a beowulf cluster
Published 2010Get full text
Get full text
Citation Index Journal -
15
Steganography algorithm to hide secret message inside an image
Published 2011Get full text
Get full text
Article -
16
Semantic-k-NN algorithm: An enhanced version of traditional k-NN algorithm
Published 2020“…The k-NN algorithm is one of the most renowned ML algorithms widely used in the area of data classification research. …”
Get full text
Get full text
Article -
17
Semantic-k-NN algorithm: An enhanced version of traditional k-NN algorithm
Published 2020“…The k-NN algorithm is one of the most renowned ML algorithms widely used in the area of data classification research. …”
Get full text
Get full text
Article -
18
Enhanced Q-Learning algorithm for potential actions selection in automated graphical user interface testing
Published 2023“…We enhanced the Q-Learning algorithm for action selection based on potential action abilities and proposed a tool, namely CrashDroid, that allows the automation of testing context-aware Android applications. …”
Get full text
Get full text
Get full text
Thesis -
19
Reduced Galloping Column Algorithm For Memory Testing
Published 2015Get full text
Get full text
Thesis -
20
Analysis and Modification of Grain - 128 Stream Cipher Algorithm
Published 2024thesis::master thesis
