Search Results - (( evolution identification using algorithm ) OR ( java applications mining algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3

    Voltage stability margin identification using evolution programming learning algorithm / Zamzuhairi Darus by Darus, Zamzuhairi

    Published 2003
    “…This project proposed on an investigation on the voltage stability margin identification using evolution programming learning algorithm. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Hybrid algorithm for NARX network parameters' determination using differential evolution and genetic algorithm by Salami, Momoh Jimoh Eyiomika, Tijani, Ismaila, Isqeel , Abdullateef Ayodele, Aibinu, Abiodun Musa

    Published 2013
    “…A hybrid optimization algorithm using Differential Evolution (DE) and Genetic Algorithm (GA) is proposed in this study to address the problem of network parameters determination associated with the Nonlinear Autoregressive with eXogenous inputs Network (NARX-network). …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6
  7. 7
  8. 8

    Hybrid DE-PEM algorithm for identification of UAV helicopter by Tijani, Ismaila, Akmeliawati, Rini, Legowo, Ari, Budiyono, Agus, Abdul Muthalif, Asan Gani

    Published 2014
    “…Purpose – The purpose of this paper is to develop a hybrid algorithm using differential evolution (DE) and prediction error modeling (PEM) for identification of small-scale autonomous helicopter state-space model. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Autotuning PID Controllers for Quadplane Hybrid UAV using Differential Evolution Algorithm by Pairan, Mohammad Fahmi, Shamsudin, Syariful Syafiq

    Published 2024
    “…The unified RBF model is then used for autotuning the PID controller using the DE algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10
  11. 11

    Nonlinear identification of a small scale unmanned helicopter using optimized NARX network with multiobjective differential evolution by Tijani, Ismaila B., Akmeliawati, Rini, Legowo, Ari, Budiyono, Agus

    Published 2014
    “…This study proposes a hybrid of conventional back propagation training algorithm for the NARX network and multiobjective differential evolution (MODE) algorithm for identification of a nonlinear model of an unmanned small scale helicopter from experimental flight data.The proposed hybrid algorithm was able to produce models with Pareto-optimal compromise between the design objectives. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Mining Sequential Patterns Using I-PrefixSpan by Dhany , Saputra, Rambli Dayang, R.A., Foong, Oi Mean

    Published 2007
    “…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    A web-based implementation of k-means algorithms by Lee, Quan

    Published 2022
    “…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  14. 14
  15. 15
  16. 16
  17. 17

    Performance of well known packet scheduling algorithms in the downlink 3GPP LTE system by Mohd Ramli, Huda Adibah, Basukala, Riyaj, Sandrasegaran, Kumbesan, Patachaianand, Rachod

    Published 2009
    “…This paper contributes to the identification of a suitable packet scheduling algorithm for use in the downlink 3GPP LTE system supporting video streaming services. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  18. 18

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
    Get full text
    Get full text
    Thesis
  19. 19

    Performance analysis of two component carrier selection algorithms in the downlink LTE-A by Mohd. Ramli, Huda Adibah, Ismail, Ahmad Fadzil, Abdullah, Khaizuran, Sandrasegaran, Kumbesan

    Published 2013
    “…Performance evaluation is conducted using the the downlink Long Term Evolution-Advanced (LTE-A) as the simulation platform. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  20. 20

    Vibration-based structural damage detection and system identification using wavelet multiresolution analysis / Seyed Alireza Ravanfar by Seyed Alireza, Ravanfar

    Published 2017
    “…Then, the damage severities at the identified locations are assessed using genetic algorithm (GA), through defining a database to reveal the relationships between the energies obtained and damage severities. …”
    Get full text
    Get full text
    Get full text
    Thesis