Search Results - (( parameter validating max algorithm ) OR ( java application customization algorithm ))
Search alternatives:
- customization algorithm »
- parameter validating »
- java application »
- validating max »
- max algorithm »
-
1
Quality of service management algorithms in WiMAX networks
Published 2015“…Moreover, an improved sleep mode control algorithm has been introduced to reduce the high energy consumption of the standard sleep mode algorithm. …”
Get full text
Get full text
Thesis -
2
Integrated combined layer algorithm of jamming detection and classification in manet / Ahmad Yusri Dak
Published 2019“…Finally, both algorithms are validated against the findings in various literatures. …”
Get full text
Get full text
Thesis -
3
Electric vehicle battery state of charge estimation using metaheuristic-optimized CatBoost algorithms
Published 2025“…A comprehensive data preprocessing pipeline was implemented, including missing value treatment, outlier removal, and feature normalization using Min-Max scaling. Three distinct metaheuristic algorithms were investigated: Barnacles Mating Optimizer (BMO), Particle Swarm Optimization (PSO), Genetic Algorithm (GA), and Whale Optimization Algorithm (WOA), each integrated with CatBoost to optimize critical parameters including learning rate, tree depth, regularization, and bagging temperature. …”
Get full text
Get full text
Get full text
Article -
4
Machine learning for mapping and forecasting poverty in North Sumatera: a datadriven approach
Published 2024“…The best model was created using the grid search cross-validation, while the best prediction results were created using the RF algorithm, with the following parameters: n-estimator = 50, max depth = 10, min samples split = 2, and min samples leaf = 1. …”
Get full text
Get full text
Get full text
Article -
5
Embedded Artificial Intelligent (AI) To Navigate Cart Follower
Published 2018“…The set of parameters used in traingd are lr, max_fail, min_grad, goal, time, and epochs. …”
Get full text
Get full text
Monograph -
6
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
Get full text
Get full text
Thesis -
7
New correlation for oil formation volume factor
Published 2014“…Subsequently, 39 data points from different reservoir fluids were used to validate the correlation. Analyses of results show that the GMDH correlation is more accurate than the existing correlations with the Average Absolute Relative Error (AARE) of 0.976, and with maximum and minimum average relative errors (max. …”
Get full text
Get full text
Conference or Workshop Item -
8
Optimization of hydropower reservoir system using genetic algorithm for various climatic scenarios
Published 2015“…Accordingly, the first aspect to point out is the generation of future climate parameters. Long Ashton Research Station-Weather Generator (LARS-WG) model is used firstly which was calibrated and validated using daily observed sunshine hours, rainfall, minimum and maximum temperature data. …”
Get full text
Get full text
Get full text
Thesis -
9
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. …”
Get full text
Get full text
Get full text
Conference or Workshop Item
