Search Results - (( developing _ missing algorithm ) OR ( java location based algorithm ))
Search alternatives:
- missing algorithm »
- java »
-
1
Missing tags detection algorithm for radio frequency identification (RFID) data stream
Published 2019“…Thus in this research, an AC complement algorithm with hashing algorithm and Detect False Negative Read algorithm (DFR) is used to developed the Missing Tags Detection Algorithm (MTDA). …”
Get full text
Get full text
Get full text
Get full text
Thesis -
2
-
3
An Evaluation of Machine Learning Algorithms for Missing Values Imputation
Published 2019“…The purpose of our review article is to focus on the developments of current techniques. For scientists rather applying different or newly develop algorithms with the identical functional goal. …”
Get full text
Get full text
Get full text
Article -
4
Detection Of Misplaced And Missing Regions In Image Using Neural Network
Published 2017“…Therefore, it is necessary to develop an algorithm that is able to detect both misplaced and missing jigsaw puzzles. …”
Get full text
Get full text
Thesis -
5
Missing-values imputation algorithms for microarray gene expression data
Published 2019“…The purpose of this review is to focus on developments in the current techniques for scientists rather than applying different or newly developed algorithms with identical functional goals. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Book Chapter -
6
Group formation using genetic algorithm
Published 2009“…However, due to lack of programming skills especially in Java programming language and the inability to have meetings frequently among the group members,most of the students’ software project cannot be delivered successfully.To solve this problem, systematic group formation is one of the initial factors that should be considered to ensure that every group consists of quality individuals who are good in Java programming and also to ensure that every group member in a group are staying closer to each other.In this research, we propose a method for group formation using Genetic Algorithms, where the members for each group will be generated based on the students’ programming skill and location of residential colleges.…”
Get full text
Get full text
Get full text
Get full text
Monograph -
7
Multi-floor indoor location estimation system based on wireless local area network
Published 2007“…The most probable match is selected and returned as estimated location based on Bayesian filtering algorithm. Estimated location is reported as physical location and symbolic location. …”
Get full text
Get full text
Thesis -
8
Enhanced mechanism to handle missing data of Hadith classifier
Published 2011Get full text
Get full text
Get full text
Proceeding Paper -
9
Auto-feed hyperparameter support vector regression prediction algorithm in handling missing values in oil and gas dataset
Published 2020“…This problem inspires the idea to develop a prediction algorithm to predict the missing values in the dataset, where Support vector regression (SVR) has been proposed as a prediction method to predict missing values in several academic types of researches. …”
Get full text
Get full text
Article -
10
Development of an imputation technique - INI for software metric database with incomplete data
Published 2007“…Though there are many algorithms to solve problem of incomplete data, unfortunately few have been developed in the field of Software Engineering. …”
Get full text
Get full text
Get full text
Book Section -
11
MISSING DAILY RAINFALL PREDICTION USING GREY WOLF OPTIMIZER-BASED NEURAL NETWORK
Published 2024“…This research chapter presents the integration of the Grey Wolf Optimizer (GWO) algorithm for training a Feedforward Neural Network (FNN) to address the issue of missing daily rainfall records. …”
Get full text
Get full text
Get full text
Book Chapter -
12
Data-driven continuous-time Hammerstein modeling with missing data using improved Archimedes optimization algorithm
Published 2024“…This research introduces the improved Archimedes optimization algorithm (IAOA) for data-driven modeling of continuous-time Hammerstein models with missing data. …”
Get full text
Get full text
Get full text
Article -
13
-
14
Imputation Analysis of Time-Series Data Using a Random Forest Algorithm
Published 2024“…To address the issue, this paper compared and evaluated four imputation methods: MissForest, MICE, Simplefill, and Softimpute which utilized Random Forest Algorithm. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
15
-
16
New Learning Models for Generating Classification Rules Based on Rough Set Approach
Published 2000“…Missing values in that attribute were replaced by the mode value. …”
Get full text
Get full text
Thesis -
17
Deep-learning-based detection of missing road lane markings using YOLOv5 algorithm
Published 2021“…With the recent technological advancement, especially in machine vision and artificial intelligence, automated or semi-automated missing road lane marking detection systems can potentially be developed. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
18
Neural Network with Genetic Algorithm Prediction Model of Energy Consumption for Billing Integrity in Gas Pipeline
Published 2012“…Along the development of oil and gas industry, missing data is one of the contributors that restrains in analyzing and processing data task in database. …”
Get full text
Get full text
Final Year Project -
19
Mathematical simulation for 3-dimensional temperature visualization on open source-based grid computing platform
Published 2009“…The development of this architecture is based on several programming language as it involves algorithm implementation on C, parallelization using Parallel Virtual Machine (PVM) and Java for web services development. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
20
Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption
Published 2022“…Subsequently, this project embedded with a lightweight Geo-Encryption algorithm to preserve the privacy of real-time GPS location. …”
Get full text
Get full text
Get full text
Academic Exercise
