Search Results - (( parameters verification method algorithm ) OR ( java application tree algorithm ))
Search alternatives:
- parameters verification »
- verification method »
- method algorithm »
- java application »
- application tree »
- tree algorithm »
-
1
-
2
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
Get full text
Get full text
Get full text
Article -
3
Failure detection analysis of grid-connected photovoltaic systems in tropical climate region / Nurmalessa Muhammad @ Atan
Published 2020“…Two additional sites from T&C of the FiT scheme were used for the verification of the new developed FD algorithm. These sites are in the Peninsular of Malaysia. …”
Get full text
Get full text
Thesis -
4
-
5
-
6
Continuation power flow for voltage stability assessment / Mohd Zamri Laton
Published 2006“…The continuation power flow program is developed using MATLAB programming language base on algorithm of continuation power flow (CPF) technique, which can compute efficiently the parameter at saddle node bifurcation point. …”
Get full text
Get full text
Thesis -
7
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
8
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…This thesis is based on the application of sentiment classification algorithm to tweet data with the goal of classifying messages based on the polarity of sentiment towards a particular topic (or subject matter). …”
Get full text
Get full text
Get full text
Thesis -
9
Effects of integration on the cost reduction in distribution network design for perishable products
Published 2014“…To solve the integrated model, a memetic algorithm (MA) is developed in this study. For verification of the proposed algorithm, its results are compared with the results of an adapted Lagrangian relaxation heuristic algorithm from the literature. …”
Get full text
Get full text
Get full text
Article -
10
Non-fiducial based ECG biometric authentication using one-class support vector machine
Published 2017“…Moreover, one-class SVM can be robust recognition algorithm for ECG biometric verification if the sufficient number of biometric samples is available.…”
Get full text
Get full text
Conference or Workshop Item -
11
Parameter estimation and outlier detection for some types of circular model / Siti Zanariah binti Satari
Published 2015“…The parameters being considered in this study is the error concentration parameter. …”
Get full text
Get full text
Thesis -
12
Numerical simulation and experimental verification on distortions induced by wire-arc additive manufacturing components and costing analysis / Keval Priapratama Prajadhiana
Published 2024“…In order to minimize the computational time of numerical WAAM simulation, two method has been proposed. The first method is utilizing the lumping layering of WAAM deposition to minimize the numbers of elements and the second method is by using Inherent Strain Method (ISM) with the help of commercial finite element software MSC Marc/Mentat. …”
Get full text
Get full text
Thesis -
13
Load flow study comparison between Newton Raphson load flow method and fast decouple load flow method / Mohd Haizilan Alias
Published 2007“…The method of power flow program is developed using MATLAB programming language base on algorithm of continuation power flow (CPF) technique, which can compute efficiently the parameter at saddle node bifurcation point. …”
Get full text
Get full text
Thesis -
14
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…In this paper, we propose an improvement of pattern growth-based PrefixSpan algorithm, called I-PrefixSpan. The general idea of I-PrefixSpan is to use the efficient data structure for general tree-like framework and separator database to reduce the execution time and memory usage. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
15
AI powered asthma prediction towards treatment formulation: an android app approach
Published 2022“…We utilized eight robust machine learning algorithms to analyze this dataset. We found that the Decision tree classifier had the best performance, out of the eight algorithms, with an accuracy of 87%. …”
Get full text
Get full text
Get full text
Article -
16
A Dual Recurrent Neural Network-based Hybrid Approach for Solving Convex Quadratic Bi-Level Programming Problem
Published 2020“…Additionally, by choosing desirable initialization of parameters, the proposed algorithm reaches the optimum with higher accuracy. …”
Get full text
Get full text
Article -
17
Computational dynamic support model for social support assignments around stressed individuals among graduate students
Published 2020“…The algorithm complexity analysis was used to measure the execution time in the worst case. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis -
18
AI powered asthma prediction towards treatment formulation : An android app approach
Published 2022“…We utilized eight robust machine learning algorithms to analyze this dataset. We found that the Decision tree classifier had the best performance, out of the eight algorithms, with an accuracy of 87%. …”
Get full text
Get full text
Get full text
Article -
19
Coastal Priority Ranking in Oil Spill Response Decision Support Mechanism
Published 2008“…Results were verified to present the inclusiveness, accuracy, and system algorithm. The verification activity involved exploring the knowledge base, coding of reasoning processes / inference engine, technical performance, ability for development, and interface. …”
Get full text
Get full text
Thesis -
20
An enhanced motion planning method for industrial robots based on the digital twin concept
Published 2025“…The research establishes an accurate kinematic model using Denavit-Hartenberg parameters and develops an efficient simplified envelope collisiondetection method. …”
Get full text
Get full text
Thesis
