Search Results - (( java implementation during algorithm ) OR ( using vector drops algorithm ))
Search alternatives:
- implementation during »
- java implementation »
- during algorithm »
- vector drops »
-
1
Machine learning methods for herschel-bulkley fluids in annulus: Pressure drop predictions and algorithm performance evaluation
Published 2020“…The impact of each input parameter affecting the pressure drop is quantified using the RF algorithm. © 2020 by the authors.…”
Get full text
Get full text
Article -
2
Comparison of algorithm Support Vector Machine and C4.5 for identification of pests and diseases in chili plants
Published 2019“…In this study comparing the performance classification techniques of Support Vector Machine (SVM) and C4.5 algorithms. The attributes used consist of Leaves, Stems, and Fruits. …”
Get full text
Get full text
Conference or Workshop Item -
3
Pairwise testing tools based on hill climbing algorithm (PTCA)
Published 2014“…The actual implementation of the algorithm which is in Java programming language, the program is implemented on Net Bean 7.0.1. …”
Get full text
Get full text
Undergraduates Project Papers -
4
Investigation of throughput and packet drop for Hata model on VANET using NCTUns simulation software for open area and suburban area / Rosmawani Samsudin
Published 2012“…The investigation was done from 5 to up 20 V ANET nodes. The algorithms considered are Ad-hoc On-demand Distance Vector (AODV) protocol. …”
Get full text
Get full text
Thesis -
5
Artificial intelligent power prediction for efficient resource management of WCDMA mobile network
Published 2023“…This artificial intelligent call admission control (CAC) was validated using a dynamic WCDMA mobile network simulator. A few comparative results in downlink have shown that our integrated support vector regression assists genetic algorithm (SVRaGA) is capable of predicting next interval power consumption at Node B with low prediction error and improving the quality of service (QoS) by reducing dropped calls. � 2008 IEICE.…”
Conference Paper -
6
Hybrid artificial intelligent algorithm for call admission control in WCDMA mobile network
Published 2023“…The proposed algorithm, support vector regression assists genetic algorithm (SVRaGA) was tested in a dynamic WCDMA mobile network simulator. …”
Conference paper -
7
A new countermeasure to combat the embedding-based attacks on the goldreich-goldwasser-halevi lattice-based cryptosystem
Published 2024“…Consequently, the simplified CVP can be reduced to a Shortest-Vector Problem (SVP) variant which can be solved by using lattice-reduction algorithms such as the LLL algorithm in a shorter amount of time. …”
Get full text
Get full text
Get full text
Article -
8
A new countermeasure to combat the embedding-based attacks on the Goldreich-Goldwasser-Halevi lattice-based cryptosystem
Published 2024“…Consequently, the simplified CVP can be reduced to a Shortest-Vector Problem (SVP) variant which can be solved by using lattice-reduction algorithms such as the LLL algorithm in a shorter amount of time. …”
Get full text
Get full text
Get full text
Article -
9
AntNet: a robust routing algorithm for data networks
Published 2004“…The performance matrix used to compare the algorithms is based on average throughput, packet loss, packet drop and end-to-end delay. …”
Get full text
Get full text
Get full text
Article -
10
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…The circuits have been designed by proteus, the microcontrollers have been programmed by micro C, and the Graphical User Interface (GUI) has been implemented in Java. Few by electronic components such as RFID, multiplexer, XBee, and servo motors have been used to realize the system. …”
Get full text
Get full text
Thesis -
11
An empirical study of pattern leakage impact during data preprocessing on machine learning-based intrusion detection models reliability
Published 2023“…Additionally, we find that some algorithms are more sensitive to data leakage than others, as seen by the drop in model accuracy when built without leakage. …”
Get full text
Get full text
Article -
12
-
13
Talkout : Protecting mental health application with a lightweight message encryption
Published 2022“…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
Get full text
Get full text
Get full text
Academic Exercise -
14
Machine learning algorithms for early predicting dropout student online learning
Published 2023“…Of the 4 algorithms used, the highest recall value is in Naive Bayes (1), the highest precision is in Logistic Regression with Lasso (1), while the highest accuracy value (0.99) and F1score (0.97) are obtained from the Support Vector Machine which has value equal to Logistic Regression with Lasso. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
15
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…The system is capable in operating an off-line programming method, starting from its programming sequences until robotic implementation of the program. During early stages, the research is emphasis more towards designing a robotic system using RoboLab software and C++ programming language. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
16
Data Hiding Techniques In Digital Images
Published 2003“…After all these studies, one of the algorithms in the masking technique is developed and implemented using JAVA program to embed message into true color image with a good quality and higher capacity. …”
Get full text
Get full text
Thesis -
17
A study on the application of discrete curvature feature extraction and optimization algorithms to battery health estimation
Published 2024“…This study employs two optimization algorithms, namely, particle swarm optimization (PSO) and sparrow optimization algorithm (SSA), in conjunction with least squares support vector machine (LSSVM) to compare the model against three conventional models, namely, Gaussian process regression (GPR), convolutional neural networks (CNN), and long short-term memory (LSTM). …”
Get full text
Get full text
Get full text
Article -
18
Multi-floor indoor location estimation system based on wireless local area network
Published 2007“…Before developing the system, study on characteristics of RSS is conducted to help the design, development and implementation of the proposed system. The proposed system is then designed and developed using Java programming language. …”
Get full text
Get full text
Thesis -
19
Minimization of torque ripple and flux droop using optimal DTC switching and sector rotation strategy
Published 2022“…A five-level cascaded H-bridge (CHB) inverter was used in the optimal DTC switching strategy because it had many voltage vectors and could be used for a variety of speed operations. …”
Get full text
Get full text
Get full text
Thesis -
20
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis
