Search Results - (( parameter estimation max algorithm ) OR ( java application modified algorithm ))
Search alternatives:
- application modified »
- java application »
- estimation max »
- max algorithm »
- parameter »
-
1
Improved Location And Positioning Utilizing Single MIMO Base Station In IMT-Advanced System
Published 2016“…This algorithm based on the angle of arrival (AOA) and angle of departure (AOD) measurement parameter completed the new SMBS algorithm with virtual base station (SMVirBS). …”
Get full text
Get full text
Get full text
Article -
2
Kernel and multi-class classifiers for multi-floor wlan localisation
Published 2016“…The multi-class classification strategy is used to ensure quick estimation of the multi-class NN algorithms. All of the algorithms are later combined to provide device location estimation for multi-floor environment. …”
Get full text
Get full text
Thesis -
3
Electric vehicle battery state of charge estimation using metaheuristic-optimized CatBoost algorithms
Published 2025“…This study presents a hybrid approach combining the CatBoost algorithm with metaheuristic optimization techniques to enhance SoC estimation accuracy and robustness. …”
Get full text
Get full text
Get full text
Article -
4
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
5
Machine learning for mapping and forecasting poverty in North Sumatera: a datadriven approach
Published 2024“…The best model was created using the grid search cross-validation, while the best prediction results were created using the RF algorithm, with the following parameters: n-estimator = 50, max depth = 10, min samples split = 2, and min samples leaf = 1. …”
Get full text
Get full text
Get full text
Article -
6
New correlation for oil formation volume factor
Published 2014“…It is a family of inductive algorithms which executes computer-based mathematical modeling of multi-parametric data sets. …”
Get full text
Get full text
Conference or Workshop Item -
7
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…A GUI is created in a form of JAVA application to display data detected from tag. …”
Get full text
Get full text
Thesis -
8
Automatic generation of content security policy to mitigate cross site scripting
Published 2016“…The algorithm is implemented as a plugin. It does not interfere with the web application original code. …”
Get full text
Get full text
Conference or Workshop Item -
9
Optimization of hydropower reservoir system using genetic algorithm for various climatic scenarios
Published 2015“…The first step, ANN was calibrated and validated by using daily observed evapotranspiration, rainfall, and stream flow (2003-2012). In order to estimate daily evapotranspiration, daily observed Min and Max temperature was used in the estimation based on Hargreaves-Samani equation. …”
Get full text
Get full text
Get full text
Thesis -
10
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis -
11
