Search Results - (( program k based algorithm ) OR ( java application customization algorithm ))

Refine Results
  1. 1
  2. 2

    Case Slicing Technique for Feature Selection by A. Shiba, Omar A.

    Published 2004
    “…CST was compared to other selected classification methods based on feature subset selection such as Induction of Decision Tree Algorithm (ID3), Base Learning Algorithm K-Nearest Nighbour Algorithm (k-NN) and NaYve Bay~sA lgorithm (NB). …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8

    Comprehensive power restoration approach using rule-based method for 11kV distribution network by Khalid A.R., Ahmad S.M.S., Shakil A., Pa N.N., Shafie R.M.

    Published 2023
    “…This paper presents a restoration algorithm based on a Rule-Based approach. The algorithm is computationally programmed to provide multiple solutions and to recommend the best option of switching for a dispatcher. …”
    Conference Paper
  9. 9
  10. 10
  11. 11
  12. 12
  13. 13

    Classification of gait parameters in stroke with peripheral neuropathy (PN) by using k-Nearest Neighbors (kNN) algorithm / N. Anang ...[et al.] by Anang, N., Jailani, R., Mustafah, N., Manaf, H.

    Published 2018
    “…This paper presents the gait pattern classification between 3 groups which are control, stroke only and stroke with Peripheral Neuropathy (SPN) using k-Nearest Neighbors (kNN) algorithm. Control group has been used as a reference or baseline in order to see the difference in the gait pattern. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    A comprehensive power restoration approach using rule-based method for 11kV distribution network by Khalid, Abd Rahman, Syed Ahmad Abdul Rahman, Sharifah Mumtazah, Shakil, Asma, Nik Pa, Nawar, Mohd Shafie, Roslin

    Published 2008
    “…This paper presents a restoration algorithm based on a Rule-Based approach. The algorithm is computationally programmed to provide multiple solutions and to recommend the best option of switching for a dispatcher. …”
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Lightning fault classification for transmission line using support vector machine by Asman, Saidatul Habsah, Ab Aziz, Nur Fadilah, Ab Kadir, Mohd Zainal Abidin, Ungku Amirulddin, Ungku Anisa, Roslan, Nurzanariah, Elsanabary, Ahmed

    Published 2023
    “…Overall, SVM algorithm performed better than k-NN in terms of classification accuracy, achieving a value of 97.10% compared to k-NN’s 70.60%. …”
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17

    Decision tree method for fault causes classification based on RMS-DWT analysis in 275 kV transmission lines network by Asman, Saidatul Habsah, Ab Aziz, Nur Fadilah, Ungku Amirulddin Al Amin, Ungku Anisa, Ab Kadir, Mohd Zainal Abidin

    Published 2021
    “…The proposed method was carried out in the MATLAB/SIMULINK programming platform based upon the information made with the fault analysis of the 275 kV sample transmission line considering wide variations in the operating conditions. …”
    Get full text
    Get full text
    Article
  18. 18
  19. 19
  20. 20

    Lightning Fault Classification for Transmission Line Using Support Vector Machine by Asman S.H., Aziz N.F.A., Kadir M.Z.A.A., Amirulddin U.A.U., Roslan N., Elsanabary A.

    Published 2024
    “…Overall, SVM algorithm performed better than k-NN in terms of classification accuracy, achieving a value of 97.10% compared to k-NN's 70.60%. …”
    Conference Paper