Search Results - (( simulation utilisation detection algorithm ) OR ( java implementation tree algorithm ))

  • Showing 1 - 9 results of 9
Refine Results
  1. 1

    Autonomous Positioning Of Unmanned Aerial Vehicle (UAV) For Power Lines Insulator Detection by Sze Sin, Voon, Kho, Lee Chin, Ngu, Sze Song, Annie, Joseph, Kuryati, Kipli

    Published 2024
    “…The proposed model leverages machine learning algorithms for autonomous detection of insulators. To determine the optimal stopping point and safety distance between the UAV and the insulator, a mathematical model is presented that utilises the captured images and the machine learning algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde by Ogunfolajin Maruff , Tunde

    Published 2022
    “…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    Nearfield Electromagnetic Imaging Technique For Brain Tumour Detection by Eustacius Jude, Anak Joseph Linggong

    Published 2019
    “…A program has been developed in C++ to execute the simulation of a head imaging. The simulation consists of two main techniques; a FDTD technique for computational electromagnetics, and Forward-Backward Time-Stepping (FBTS) technique, an algorithm to solve inverse problems. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    Single-linkage method to detect multiple outliers with different outlier scenarios in circular regression model by Siti Zanariah, Satari, Nur Faraidah, Muhammad Di, Roslinazairimah, Zakaria

    Published 2018
    “…Single-linkage is one of the algorithms in agglomerative clustering technique that can be used to detect outliers. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    The summer heat of cryptojacking season : Detecting cryptojacking using heatmap and fuzzy by Ahmad Firdaus, Zainal Abidin, Aldharhani, Ghassan Saleh, Zahian, Ismail, Mohd Faizal, Ab Razak

    Published 2022
    “…This experiment utilised actual cryptojacking samples and achieved a 100 percent detection accuracy rate in simulation.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization by Mohammad Ata, Karimeh Ibrahim

    Published 2019
    “…This study proposes a car parking management system which applies Dijkstra’s algorithm, Ant Colony Optimization (ACO) and Binary Search Tree (BST) in structuring a guidance system for indoor parking. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Modified sequential fences for identifying univariate outliers by Wong, Hui Shein

    Published 2016
    “…Sequential fences method is modified by replacing interquartile range with various robust scales such as semi-interquartile range, , median absolute deviation ( ) and Gini’s mean difference ( ) in order to improve outlier detection in symmetric distribution. Ultimately, the utilisation of in sequential fences seems to demonstrate a comparable accuracy in detecting the contaminated data. …”
    Get full text
    Get full text
    Thesis
  9. 9