Search Results - (( data reduction function algorithm ) OR ( java application tree algorithm ))

Refine Results
  1. 1
  2. 2

    Rtl Implementation Of Secure Hash Algorithm 3 (Sha-3) Towards Smaller Area by Lim , Yen Ruen

    Published 2017
    “…Cryptographic hash functions are generally the basis of a secure network and used for data integrity verification. …”
    Get full text
    Get full text
    Thesis
  3. 3

    New Learning Models for Generating Classification Rules Based on Rough Set Approach by Al Shalabi, Luai Abdel Lateef

    Published 2000
    “…Two different models for learning in data sets were proposed based on two different reduction algorithms. …”
    Get full text
    Get full text
    Thesis
  4. 4

    HDRA: A Haybird Data Reduction and Routing Algorithm by Hussein, M. K., Marghescu, Ion, A. M. Alduais, Nayef

    Published 2024
    “…Consequently, this study introduces a Hybrid Data Reduction and Routing Algorithm (HDRA). The principal aim of HDRA is to prolong the lifespan of clusterbased WSNs. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    HDRA: A Haybird Data Reduction and Routing Algorithm by M. K. Hussein, M. K. Hussein, Ion Marghescu, Ion Marghescu, Nayef A. M. Alduais, Nayef A. M. Alduais

    Published 2024
    “…Consequently, this study introduces a Hybrid Data Reduction and Routing Algorithm (HDRA). The principal aim of HDRA is to prolong the lifespan of clusterbased WSNs. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7
  8. 8
  9. 9

    Network reconfiguration and control for loss reduction using genetic algorithm by Jawad, Mohamed Hassan Izzaldeen

    Published 2010
    “…In this work a feeder reconfiguration algorithm is presented for the purpose of power loss reduction in distribution networks. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Data-based PID control of flexible joint robot using adaptive safe experimentation dynamics algorithm by Mohd Ashraf, Ahmad, Haszuraidah, Ishak, Ahmad Nor Kasruddin, Nasir, Normaniha, Abd Ghani

    Published 2021
    “…The ASED algorithm is an enhanced version of SED algorithm where the updated tuning variable is modified to adapt to the change of the objective function. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde by Ogunfolajin Maruff , Tunde

    Published 2022
    “…This thesis is based on the application of sentiment classification algorithm to tweet data with the goal of classifying messages based on the polarity of sentiment towards a particular topic (or subject matter). …”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13

    Enhancing speed performance of the cryptographic algorithm based on the lucas sequence by M. Abulkhirat, Esam

    Published 2003
    “…The deployment of network security procedures requires the implementation of cryptographic functions. More specifically, these include encryption, decryption, authentication, digital signature algorithms and message-digest functions. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Levy Flight Safe Experimentation Dynamics Algorithm for Data-Based PID Tuning of Flexible Joint Robot by Mohd Ashraf, Ahmad, Mohd Helmi, Suid, Muhammad Ikram, Mohd Rashid, Mohd Zaidi, Mohd Tumari, M. H., Sulaiman

    Published 2020
    “…The LFSED algorithm is an enhanced version of SED algorithm where the random perturbation of the updated tuning variable is based on Levy Flight function. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15
  16. 16
  17. 17

    A hybrid approach for artificial immune recognition system / Mahmoud Reza Saybani by Mahmoud Reza, Saybani

    Published 2016
    “…The components of the AIRS2 algorithm that pose problems will be modified. This thesis proposes three new hybrid algorithms: The FRA-AIRS2 algorithm uses fuzzy logic to improve data reduction capability of AIRS2 and to solve the linearity problem associated with resource allocation of AIRS. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Mining Sequential Patterns Using I-PrefixSpan by Dhany , Saputra, Rambli Dayang, R.A., Foong, Oi Mean

    Published 2007
    “…In this paper, we propose an improvement of pattern growth-based PrefixSpan algorithm, called I-PrefixSpan. The general idea of I-PrefixSpan is to use the efficient data structure for general tree-like framework and separator database to reduce the execution time and memory usage. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19

    Real-time system identification of an unmanned quadcopter system using fully tuned radial basis function neural networks by Pairan, Mohammad Fahmi, Shamsudin, Syariful Syafiq, Mohd Anwar, Mohd Shazlan

    Published 2021
    “…The EMRAN’s performance is compared with the minimal resource allocating network (MRAN) training for 1000 input-output pair untrained attitude data. The findings show that the EMRAN method generates a faster mean training time of roughly 4.16 ms for neuron size of up to 88 units compared to MRAN at 5.89 ms with a slight reduction in prediction accuracy.…”
    Get full text
    Get full text
    Article
  20. 20