Search Results - (( development programme normalization algorithm ) OR ( java predictive modelling algorithm ))
Search alternatives:
- normalization algorithm »
- predictive modelling »
- modelling algorithm »
- java predictive »
- programme »
-
1
Mapreduce algorithm for weather dataset
Published 2017“…Results from the proposed algorithm have been compared with the existing model known as AWK (Alfred Aho, Peter Weinberger, and Brian Kernighan) model. …”
Get full text
Get full text
Thesis -
2
Software metrics selection model for predicting maintainability of object-oriented software using genetic algorithms
Published 2016“…This thesis clarifies the issue using the objective method to develop the GA metric selection model for predicting the maintainability of object-oriented systems. …”
Get full text
Get full text
Thesis -
3
MapReduce algorithm for weather dataset
Published 2018“…Results from the proposed algorithm have been compared with the existing model known as AWK (Alfred Aho, Peter Weinberger, and Brian Kernighan) model. …”
Get full text
Get full text
Research Report -
4
Parallel computation of maass cusp forms using mathematica
Published 2013“…To facilitate the complete pullback process of this group, a point locater algorithm is developed. In this work, we present three different pullback algorithms for the surfaces we considered and carefully integrate them into our Maass cusp form algorithm. …”
Get full text
Get full text
Thesis -
5
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…On the Construction phase, the development of the prototype has been started. All the algorithm for the engine has been developed by using Java script language. …”
Get full text
Get full text
Thesis -
6
Developed method of FPGA-based fuzzy logic controller design with the aid of conventional PID algorithm
Published 2009“…This paper proposes developed method to design a digital fuzzy logic controller with the aid of conventional Proportional – integral – derivative (PID) controller using field programmable gate array (FPGA). …”
Get full text
Get full text
Get full text
Article -
7
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
Get full text
Get full text
Thesis -
8
Agent-based extraction algorithm for computational problem solving
Published 2015“…Several statistical tests such as normality test and reliability analysis were conducted. …”
Get full text
Get full text
Thesis -
9
Visualisation tool to study malaria transmission using network modelling
Published 2014“…Java was used to implement the visualisation tool. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
10
Landslide Susceptibility Mapping with Stacking Ensemble Machine Learning
Published 2024“…One of the prominent methods to improve machine learning accuracy is by using ensemble method which basically employs multiple base models. In this paper, the stacking ensemble method is used to increase the accuracy of the machine learning model for LSM where the base (first-level) learners use five ML algorithms namely decision tree (DT), k-nearest neighbor (KNN), AdaBoost, extreme gradient boosting (XGB) and random forest (RF). …”
Conference Paper -
11
Anfis Modelling On Diabetic Ketoacidosis For Unrestricted Food Intake Conditions
Published 2017“…Currently, different prediction model for diabetic ketoacidosis are used depending on fasting or non-fasting conditions. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
12
Automatic Classification of Cervix Type
Published 2019“…In a developed country like United States, cervical cancer rate has been improved by 70% in the last 40 years due to a good screening programmes implemented in their country. …”
Get full text
Get full text
Final Year Project -
13
An ensemble learning method for spam email detection system based on metaheuristic algorithms
Published 2015“…In the second phase, a classifier ensemble learning model is proposed consisting of separate outputs: (i) To select a relevant subset of original features based on Binary Quantum Gravitational Search Algorithm (QBGSA), (ii) To mine data streams using various data chunks and overcome a failure of single classifiers based on SVM, MLP and K-NN algorithms. …”
Get full text
Get full text
Thesis -
14
A customized floating-point processor design for FPGA and ASIC based thermal compensation in high-precision sensing
Published 2021“…The signal processing techniques in the sensors are normally implemented using Field Programmable Gate Arrays (FPGAs) or Application-Specific Integrated Circuits (ASICs). …”
Get full text
Get full text
Article -
15
Nonlinear three-dimensional finite elements for composite concrete beams
Published 2012“…Therefore in this study, new interface elements have been developed,while modified constitutive law have been applied and new computational algorithm is utilised. …”
Get full text
Get full text
Thesis -
16
Magnetic resonance imaging sense reconstruction system using FPGA / Muhammad Faisal Siddiqui
Published 2016“…This thesis aimed to investigate and develop a novel parameterized architecture design for SENSE algorithm. …”
Get full text
Get full text
Get full text
Thesis -
17
Fuzzy-based multi-agent approach for reliability assessment and improvement of power system protection
Published 2015“…The simulation results for the first and second models are done using the data obtained from Malaysia distribution network (DISCO-Net) and 69 bus test system that were implemented using Java Agent Development Framework package software. …”
Get full text
Get full text
Thesis -
18
Preliminary study on fault detection using artificial neural network for water-cooled reactors
Published 2020“…This work was carried out to discover the use of an artificial neural network (ANN) to model and develop a fault detection programme in the RTP cooling system. …”
Get full text
Get full text
Get full text
Article -
19
Challenges of hidden data in the unused area two within executable files
Published 2009“…Problem statement: The executable files are one of the most important files in operating systems and in most systems designed by developers (programmers/software engineers), and then hiding information in these file is the basic goal for this study, because most users of any system cannot alter or modify the content of these files. …”
Get full text
Get full text
Get full text
Article
