Search Results - (( development action using algorithm ) OR ( java application tree algorithm ))
Search alternatives:
- development action »
- java application »
- application tree »
- using algorithm »
- tree algorithm »
- action using »
-
1
-
2
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
Get full text
Get full text
Get full text
Article -
3
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
4
Development of self-learning algorithm for autonomous system utilizing reinforcement learning and unsupervised weightless neural network / Yusman Yusof
Published 2019“…From the reviews, it is evident that autonomous system is set to handle finite number of encountered states using finite sequences of actions. In order to learn the optimized states-action policy the self-learning algorithm is developed using hybrid AI algorithm by combining unsupervised weightless neural network, which employs AUTOWiSARD and reinforcement learning algorithm, which employs Q-learning. …”
Get full text
Get full text
Thesis -
5
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…This thesis is based on the application of sentiment classification algorithm to tweet data with the goal of classifying messages based on the polarity of sentiment towards a particular topic (or subject matter). …”
Get full text
Get full text
Get full text
Thesis -
6
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…In this paper, we propose an improvement of pattern growth-based PrefixSpan algorithm, called I-PrefixSpan. The general idea of I-PrefixSpan is to use the efficient data structure for general tree-like framework and separator database to reduce the execution time and memory usage. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
7
Shunt active power filter using hybrid fuzzy-proportional and crisp-integral control algorithms for total harmonic distortion improvement
Published 2016“…Meanwhile, the Crisp-I current controller is developed to perform the integral control action, in which a controllable integral gain value is introduced.Third, a HFP+CI self-charging dc-link voltage control algorithm is constructed, using the self-charging control strategy together with a combination of Fuzzy-P and Crisp-I voltage controllers. …”
Get full text
Get full text
Thesis -
8
AI powered asthma prediction towards treatment formulation: an android app approach
Published 2022“…We utilized eight robust machine learning algorithms to analyze this dataset. We found that the Decision tree classifier had the best performance, out of the eight algorithms, with an accuracy of 87%. …”
Get full text
Get full text
Get full text
Article -
9
-
10
A novel deadlock detection algorithm for neighbour replication on grid environment
Published 2012“…The NRGDD simulation model has been developed to test the algorithm on NRG. Two experiments have been conducted to test the correctness of NRGDD algorithm. …”
Get full text
Get full text
Thesis -
11
Adaptive artificial neural network for power system security assessment and control action
Published 2012“…This is particularly important for giving a possible control action to mitigate an insecure situation during disturbance using AANN. …”
Get full text
Get full text
Thesis -
12
AI powered asthma prediction towards treatment formulation : An android app approach
Published 2022“…We utilized eight robust machine learning algorithms to analyze this dataset. We found that the Decision tree classifier had the best performance, out of the eight algorithms, with an accuracy of 87%. …”
Get full text
Get full text
Get full text
Article -
13
Simulation of an adaptive artificial neural network for power system security enhancement including control action
Published 2015“…This paper presents a new method for enhancing power system security, including a remedial action, using an artificial neural network (ANN) technique. …”
Get full text
Get full text
Get full text
Article -
14
Predicting attackers of online shaming using ant colony optimization / Noor Shafiqa Fazlien Mohamad Fauzi
Published 2020“…In order to predict the attackers of online shaming, Ant Colony Optimization Algorithm will be used and it will be compared with J48 algorithm. …”
Get full text
Get full text
Thesis -
15
An interactive analytics approach for sustainable and resilient case studies: a machine learning perspective
Published 2023“…To show the methods applicability, this paper uses the proposed algorithm in three sustainable and resilient case studies. …”
Get full text
Get full text
Article -
16
Adaptive hybrid fuzzy-proportional plus crisp-integral current control algorithm for shunt active power filter operation
Published 2016“…Hence, it simplifies the controller development. Meanwhile, the Crisp-I current controller is developed to perform integral control action using a controllable gain value; to improve the steady-state control mechanism. …”
Get full text
Get full text
Article -
17
Magnetic attitude control options for earth pointing small satellite
Published 2011“…The developed control algorithms are modeled using the MATLAB SIMULINK codes. …”
Get full text
Get full text
Thesis -
18
Design and Implementation of Intelligent Interoperability Framework for Heterogeneous Subsystems in Smart Home Environment
Published 2011“…The third algorithm, named as Pro-Active Intelligence algorithm has inspired autonomous action triggering for each event interoperation, using a control action statement that is generated by SOAP packets required for joint execution of tasks among heterogeneous subsystems. …”
Get full text
Get full text
Thesis -
19
A hybrid database encryption algorithm based on reverse string and dynamic key
Published 2016“…Personal computers has become one of the important part of human life, especially when they using the Internet or any public networks.So, the information or data may still be deliberately or inadvertently leaked out by the insiders or customers.In this paper, we proposing new algorithm to protect any type of data, depending on the substitution techniques, using dynamic key (DK) and reveres string for each character in the text (or field in the file of the database) and each string .A special equation was developed to generate the DK, it’s depend on the length of string, order the character in the string,ASCII code of the character, and string sequence.The proposed algorithm using the reverse string before encryption, also, there are two actions after that, for the purpose of increasing the complexity of the algorithm.The results showed that The developed algorithm was successes to remove any duplicate encryption, for each character and each record even when the text duplicated.…”
Get full text
Get full text
Conference or Workshop Item -
20
An accurate algorithm of PMU-based wide area measurements for fault detection using positive-sequence voltage and unwrapped dynamic angles
Published 2022“…Among different algorithms, this study focuses on modelling the non- recursive phasor estimation method in a power Simulink environment for a standard test system equipped with a developed algorithm to detect the fault zone. …”
Get full text
Get full text
Get full text
Get full text
Article
