Search Results - (( identification implementation method algorithm ) OR ( java implementation tree algorithm ))
Search alternatives:
- identification implementation »
- implementation method »
- java implementation »
- implementation tree »
- method algorithm »
- tree algorithm »
-
1
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
Get full text
Get full text
Get full text
Article -
2
Register Transfer Level Implementation Of Pooling - Based Feature Extraction For Finger Vein Identification
Published 2017“…Many improvements methods were utilized to increase the speed and accuracy of the identification. …”
Get full text
Get full text
Thesis -
3
Smoothed functional algorithm with norm-limited update vector for identification of continuous-time fractional-order Hammerstein Models
Published 2024“…In particular, the standard smoothed functional algorithm (SFA) based method is modified by implementing a limit function in the update vector of the standard SFA based method to solve the issue of high tendency of divergence during the identification process. …”
Get full text
Get full text
Get full text
Article -
4
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
Get full text
Get full text
Get full text
Thesis -
5
-
6
An implementation of open systems interconnection (OSI) transport layer P2P identification algorithm using Netflow and Netfilter as a P2P traffic firewall / Amir Herman Amiruddin
Published 2014“…The purpose of this dissertation was to implement OSI Transport Layer P2P identification algorithm using Netflow and Netfilter as a P2P traffic firewall. …”
Get full text
Get full text
Thesis -
7
-
8
SYSTEM IDENTIFICATION AND MODEL PREDICTIVE CONTROL FOR INTERACTING SERIES PROCESS WITH NONLINEAR DYNAMICS
Published 2009“…Several important issues in the identification process and real-time implementation of model predictive control algorithm are also discussed. …”
Get full text
Get full text
Thesis -
9
Feature identification in a real surface metrology analysis by means of Double Iteration Sobel (DIS) / Ainaa Farhanah Mohd Razali
Published 2022“…Although there are many feature identification and feature extraction procedures to identify and extract the features on the surfaces based on segmentation methods as presented in previous studies, problem arises when most of them are unable to fulfil the requirements when being implemented on a particular surface topography such as unable to point out at which exact data points the edges features are actually located. …”
Get full text
Get full text
Thesis -
10
Real-time system identification of an unmanned quadcopter system using fully tuned radial basis function neural networks
Published 2021“…To prevent the neurons and network parameters selection dilemma during trial and error approach, RBF with EMRAN training algorithm is proposed. This automatic tuning algorithm will implement the network growing and pruning method to add or eliminate neurons in the RBF. …”
Get full text
Get full text
Article -
11
DEVELOPMENT OF IRIS RECOGNITION SYSTEM
Published 2016“…This project implements an iris recognition algorithm as a biometric identification. …”
Get full text
Get full text
Final Year Project -
12
Real-time system identification of an unmanned quadcopter system using fully tuned radial basis function neural networks
Published 2021“…To prevent the neurons and network parameters selection dilemma during trial and error approach, RBF with EMRAN training algorithm is proposed. This automatic tuning algorithm will implement the network growing and pruning method to add or eliminate neurons in the RBF. …”
Get full text
Get full text
Article -
13
Gender identification using support vector machines
Published 2023“…This thesis is introduces SVM theory application and its algorithmic implementations.…”
text::Thesis -
14
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…This study proposes a car parking management system which applies Dijkstra’s algorithm, Ant Colony Optimization (ACO) and Binary Search Tree (BST) in structuring a guidance system for indoor parking. …”
Get full text
Get full text
Thesis -
15
Identification of continuous-time model of hammerstein system using modified multi-verse optimizer
Published 2021“…his thesis implements a novel nature-inspired metaheuristic optimization algorithm, namely the modified Multi-Verse Optimizer (mMVO) algorithm, to identify the continuous-time model of Hammerstein system. …”
Get full text
Get full text
Thesis -
16
-
17
Parameter identification of an autonomous quadrotor
Published 2011“…This paper describes one of possible parameter identification approach for a quadrotor. The unknown parameter of the quadrotor will be identified using state estimation method with the implementation of Unscented Kalman Filter (UKF). …”
Get full text
Get full text
Get full text
Proceeding Paper -
18
Hybrid intelligent methods for parameter identification and load frequency control in power system
Published 2014“…For example, the classical methods for parameter identification (LSE and MLE), the classical methods for LFC (PI, PD and PID) and the intelligent methods (fuzzy logic, neural network, genetic algorithm, and PSO). …”
Get full text
Get full text
Thesis -
19
Data mining in mobile ECG based biometric identification
Published 2014“…Experimentation results showed that our method simplifies biometric identification process by obtaining reduced computational complexity when compared to other related algorithms. …”
Get full text
Get full text
Get full text
Article -
20
Grouping based radio frequency identification anti-collision protocols for dense internet of things application
Published 2022“…The results also demonstrate FCMBG bettered other grouping-based algorithms (GB-DFSA and GBSA) whose tag estimation method are based on collision slots in terms slot efficiency by over 10% and also in terms of identification time.…”
Get full text
Get full text
Article
