Search Results - (( hindering optimization based algorithm ) OR ( java application tree algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3

    Optimal demand response of solar energy generation using Genetic Algorithm / Muhammad Asyraaf Adlan by Adlan, Muhammad Asyraaf

    Published 2025
    “…The aim of this study is to optimize the demand response of solar energy generation using Genetic Algorithm (GA) to minimize the daily yield loss caused by load shedding. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Chaotic Immune Symbiotic Organisms Search algorithm for solving optimisation problem by Zamani M.K.M., Musirin I., Suliman S.I., Mustaffa S.A.S.

    Published 2023
    “…Despite the performance of these algorithms, the flaws of these algorithms hinder them from producing high-quality results. …”
    Article
  5. 5
  6. 6

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7
  8. 8
  9. 9

    A Framework for Green Energy Resources Identification and Integration Supported by Real-Time Monitoring, Control, and Automation Applications by Far Chen, Jong

    Published 2025
    “…Sarawak is transitioning to green energy adoption, yet progress is hindered by a lack of comprehensive spatial data to identify optimal locations, inadequate optimization techniques for effective integration of these sites, and insufficient robust Industrial Internet of Things-based real-time monitoring and automation strategies to manage the intermittent nature of green energy resources. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11

    Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde by Ogunfolajin Maruff , Tunde

    Published 2022
    “…This thesis is based on the application of sentiment classification algorithm to tweet data with the goal of classifying messages based on the polarity of sentiment towards a particular topic (or subject matter). …”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    Partitioning Detection and Connectivity Restoration Algorithm for Wireless Sensor Actor Networks by Imran, Muhammad, Younis, Mohamed, Md Said, Abas, Hasbullah, Halabi

    Published 2010
    “…We present PCR, a hybrid novel distributed partitioning detection and connectivity restoration algorithm. It proactively identifies critical actors based on local topological information and designates appropriate backup nodes to handle their failure. …”
    Get full text
    Get full text
    Article
  13. 13
  14. 14

    Power management and optimized control of hybrid PV-BESS-grid integrated fast EV charging stations by Elsanabary A., Khairullah K., Aziz N.F.A., Mekhilef S.

    Published 2025
    “…The optimized tuning method using the proposed algorithm shows superior performance compared to other methods. …”
    Article
  15. 15

    Adaptive medium access control protocol of Wifi-Halow for home machine-to-machine network by Liew, Jiun Terng

    Published 2019
    “…Firstly, this work proposed a novel algorithm known as probability-based opportunity dynamic adaptation (PODA) of CW for home M2M network. …”
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17

    Partitioning detection and connectivity restoration algorithm for WSAN by Muhammad, Imran, Md Said, Abas, Hasbullah, Halabi, Younis, Mohammed

    Published 2010
    “…This paper presents PCR, a novel distributed partitioning detection and connectivity restoration algorithm. PCR proactively identifies critical actors based on local topological information and designate appropriate backup nodes (preferably non-critical) to handle their failure. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18

    Balancing data utility versus information loss in data-privacy protection using k-Anonymity by Esmeel, Thamer Khalil, Hasan, Md Munirul, Kabir, Muhammad Nomani, Ahmad, Firdaus

    “…Based on the classification accuracy, the optimal values of k and c are obtained, and thus, the optimal k and c can be used for kanonymity algorithm to anonymize optimal number of columns of the dataset.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19

    Mining Sequential Patterns Using I-PrefixSpan by Dhany , Saputra, Rambli Dayang, R.A., Foong, Oi Mean

    Published 2007
    “…In this paper, we propose an improvement of pattern growth-based PrefixSpan algorithm, called I-PrefixSpan. The general idea of I-PrefixSpan is to use the efficient data structure for general tree-like framework and separator database to reduce the execution time and memory usage. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20

    Mental stress classification based on selected electroencephalography channels using correlation coefficient of Hjorth parameters by Hag, Ala, Al-Shargie, Fares, Handayani, Dini Oktarina Dwi, Asadi, Houshyar

    Published 2023
    “…Such limitations encompass computational complexity, potential overfitting, and the prolonged setup time for electrode placement, all of which can hinder practical applications. To address these challenges, this study presents the novel CCHP method, aimed at identifying and ranking commonly optimal EEG channels based on their sensitivity to the mental stress state. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article