Search Results - (( loading identification learning algorithm ) OR ( java implementation learning algorithm ))
Search alternatives:
- identification learning »
- implementation learning »
- loading identification »
- java implementation »
- learning algorithm »
-
1
Voltage stability margin identification using evolution programming learning algorithm / Zamzuhairi Darus
Published 2003“…Voltage stability problems have been one of the major concerns for electric utilities as a result of a system heavy loading. This project proposed on an investigation on the voltage stability margin identification using evolution programming learning algorithm. …”
Get full text
Get full text
Thesis -
2
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
3
Development of multi-objective load shedding optimization via back tracking search algorithm with novel reactive power tracing index
Published 2023“…Electric power plant loads; Learning algorithms; MATLAB; Multiobjective optimization; Optimization; Reactive power; Back tracking; Backtracking search algorithms; Identification method; Load-shedding; Multi-objective functions; Power flow simulation; System contingencies; Under voltage load shedding; Electric load shedding…”
Conference Paper -
4
An Educational Tool Aimed at Learning Metaheuristics
Published 2020“…Implemented with Java, this tool provides a friendly GUI for setting the parameters and display the result from where the learner can see how the selected algorithm converges for a particular problem solution. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
Get full text
Get full text
Get full text
Thesis -
6
Computationally efficient sequential learning algorithms for direct link resource-allocating networks
Published 2005“…Computationally efficient sequential learning algorithms are developed for direct-link resource-allocating networks (DRANs). …”
Get full text
Get full text
Article -
7
A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment
Published 2013“…The methodology used consists of theoretical study, design of formal framework on intelligent software quality, identification of Feature Ranking Technique (FRT), construction and evaluation of FRA algorithm. The assessment of quality attributes has been improved using FRA algorithm enriched with a formula to calculate the priority of attributes and followed by learning adaptation through Java Library for Multi Label Learning (MULAN) application. …”
Get full text
Get full text
Get full text
Thesis -
8
CAT CHAOTIC GENETIC ALGORITHM BASED TECHNIQUE AND HARDWARE PROTOTYPE FOR SHORT TERM ELECTRICAL LOAD FORECASTING
Published 2017“…In this research work, a modified backpropagation neural network is combined with a modified chaos-search genetic algorithm for STLF of one day and a week ahead. Multiple modifications are carried out on the conventional back-propagation (BP) algorithm such as, improvements in the momentum factor and adaptive learning rate. …”
Get full text
Get full text
Thesis -
9
Bio-signal identification using simple growing RBF-network (OLACA)
Published 2007Get full text
Get full text
Conference or Workshop Item -
10
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
Get full text
Get full text
Thesis -
11
Data mining for structural damage identification using hybrid artificial neural network based algorithm for beam and slab girder / Meisam Gordan
Published 2020“…It was also concluded that the ICA could successfully improve the learning process of the neural network. Therefore, the obtained results through the proposed DM procedure using ANN-ICA (1) confirmed the robustness of the hybrid network in compare to the pre-developed network, and (2) indicated that, the proposed damage identification model can be considered as a precise approach for monitoring the structural condition subjected to vibrational loads. …”
Get full text
Get full text
Get full text
Thesis -
12
Detection and classification of conflict flows in SDN using machine learning algorithms
Published 2021“…Moreover, applying machine learning algorithms in the identification and classification of conflicting flows has limitations. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
13
-
14
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
Get full text
Get full text
Thesis -
15
Fault classification in smart distribution network using support vector machine
Published 2023“…Machine learning application have been widely used in various sector as part of reducing work load and creating an automated decision making tool. …”
Article -
16
New techniques incorporating computational intelligence based for voltage stability evaluation and improvement in power system / Nur Fadilah Ab. Aziz
Published 2014“…VSCI was used as the indicator for the MLP of load buses. Another new hybrid algorithm that used Evolutionary Programming (EP) termed as Evolutionary Support Vector Machine (ESVM) was also developed for comparative study. …”
Get full text
Get full text
Thesis -
17
Talkout : Protecting mental health application with a lightweight message encryption
Published 2022“…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
Get full text
Get full text
Get full text
Academic Exercise -
18
Design and implementation of a real-time adaptive learning algorithm controller for a 3-DOF parallel manipulator / Mustafa Jabbar Hayawi
Published 2015“…An electronic board, transistor relay driver circuit, is designed for the purpose of establishing communication interface between the computer, adaptive learning algorithm and the actuator mechanism. Design and development an adaptive learning algorithm controller ALAC of position the actuators is presented in real time parallel manipulator based on artificial neural network ANN. …”
Get full text
Get full text
Thesis -
19
Mathematical simulation for 3-dimensional temperature visualization on open source-based grid computing platform
Published 2009Get full text
Get full text
Get full text
Conference or Workshop Item -
20
Machine Learning-Enabled Communication Approach for the Internet of Medical Things
Published 2023“…In this paper, a machine learning-enabled shortest path identification scheme is presented to ensure reliable transmission of frames, especially with the minimum possible communication overheads in the IoMT network. …”
Get full text
Get full text
Get full text
Get full text
Article
