Search Results - (( data reduction function algorithm ) OR ( java application tree algorithm ))
Search alternatives:
- reduction function »
- function algorithm »
- java application »
- application tree »
- data reduction »
- tree algorithm »
-
1
-
2
Rtl Implementation Of Secure Hash Algorithm 3 (Sha-3) Towards Smaller Area
Published 2017“…Cryptographic hash functions are generally the basis of a secure network and used for data integrity verification. …”
Get full text
Get full text
Thesis -
3
New Learning Models for Generating Classification Rules Based on Rough Set Approach
Published 2000“…Two different models for learning in data sets were proposed based on two different reduction algorithms. …”
Get full text
Get full text
Thesis -
4
HDRA: A Haybird Data Reduction and Routing Algorithm
Published 2024“…Consequently, this study introduces a Hybrid Data Reduction and Routing Algorithm (HDRA). The principal aim of HDRA is to prolong the lifespan of clusterbased WSNs. …”
Get full text
Get full text
Get full text
Article -
5
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
Get full text
Get full text
Get full text
Article -
6
HDRA: A Haybird Data Reduction and Routing Algorithm
Published 2024“…Consequently, this study introduces a Hybrid Data Reduction and Routing Algorithm (HDRA). The principal aim of HDRA is to prolong the lifespan of clusterbased WSNs. …”
Get full text
Get full text
Get full text
Article -
7
Reference-free Reduction of Ballistocardiogram Artifact from EEG Data Using EMD-PCA
Published 2014Get full text
Get full text
Conference or Workshop Item -
8
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
9
Network reconfiguration and control for loss reduction using genetic algorithm
Published 2010“…In this work a feeder reconfiguration algorithm is presented for the purpose of power loss reduction in distribution networks. …”
Get full text
Get full text
Thesis -
10
Data-based PID control of flexible joint robot using adaptive safe experimentation dynamics algorithm
Published 2021“…The ASED algorithm is an enhanced version of SED algorithm where the updated tuning variable is modified to adapt to the change of the objective function. …”
Get full text
Get full text
Get full text
Get full text
Article -
11
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…This thesis is based on the application of sentiment classification algorithm to tweet data with the goal of classifying messages based on the polarity of sentiment towards a particular topic (or subject matter). …”
Get full text
Get full text
Get full text
Thesis -
12
-
13
Enhancing speed performance of the cryptographic algorithm based on the lucas sequence
Published 2003“…The deployment of network security procedures requires the implementation of cryptographic functions. More specifically, these include encryption, decryption, authentication, digital signature algorithms and message-digest functions. …”
Get full text
Get full text
Thesis -
14
Levy Flight Safe Experimentation Dynamics Algorithm for Data-Based PID Tuning of Flexible Joint Robot
Published 2020“…The LFSED algorithm is an enhanced version of SED algorithm where the random perturbation of the updated tuning variable is based on Levy Flight function. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
15
Optimisation of neural network with simultaneous feature selection and network prunning using evolutionary algorithm
Published 2015“…The fitness function also considers feature and the neuron reduction in the hidden layer. …”
Get full text
Get full text
Get full text
Get full text
Article -
16
Reference-free reduction of ballistocardiogram artifact from EEG data using EMD-PCA
Published 2014Get full text
Get full text
Conference or Workshop Item -
17
A hybrid approach for artificial immune recognition system / Mahmoud Reza Saybani
Published 2016“…The components of the AIRS2 algorithm that pose problems will be modified. This thesis proposes three new hybrid algorithms: The FRA-AIRS2 algorithm uses fuzzy logic to improve data reduction capability of AIRS2 and to solve the linearity problem associated with resource allocation of AIRS. …”
Get full text
Get full text
Thesis -
18
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…In this paper, we propose an improvement of pattern growth-based PrefixSpan algorithm, called I-PrefixSpan. The general idea of I-PrefixSpan is to use the efficient data structure for general tree-like framework and separator database to reduce the execution time and memory usage. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
19
Real-time system identification of an unmanned quadcopter system using fully tuned radial basis function neural networks
Published 2021“…The EMRAN’s performance is compared with the minimal resource allocating network (MRAN) training for 1000 input-output pair untrained attitude data. The findings show that the EMRAN method generates a faster mean training time of roughly 4.16 ms for neuron size of up to 88 units compared to MRAN at 5.89 ms with a slight reduction in prediction accuracy.…”
Get full text
Get full text
Article -
20
