Search Results - (( simulation utilisation detection algorithm ) OR ( java implementation tree algorithm ))
Search alternatives:
- simulation utilisation »
- utilisation detection »
- java implementation »
- implementation tree »
- tree algorithm »
-
1
Autonomous Positioning Of Unmanned Aerial Vehicle (UAV) For Power Lines Insulator Detection
Published 2024“…The proposed model leverages machine learning algorithms for autonomous detection of insulators. To determine the optimal stopping point and safety distance between the UAV and the insulator, a mathematical model is presented that utilises the captured images and the machine learning algorithm. …”
Get full text
Get full text
Get full text
Article -
2
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
Get full text
Get full text
Get full text
Article -
3
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
Get full text
Get full text
Get full text
Thesis -
4
Nearfield Electromagnetic Imaging Technique For Brain Tumour Detection
Published 2019“…A program has been developed in C++ to execute the simulation of a head imaging. The simulation consists of two main techniques; a FDTD technique for computational electromagnetics, and Forward-Backward Time-Stepping (FBTS) technique, an algorithm to solve inverse problems. …”
Get full text
Get full text
Get full text
Thesis -
5
Single-linkage method to detect multiple outliers with different outlier scenarios in circular regression model
Published 2018“…Single-linkage is one of the algorithms in agglomerative clustering technique that can be used to detect outliers. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
6
The summer heat of cryptojacking season : Detecting cryptojacking using heatmap and fuzzy
Published 2022“…This experiment utilised actual cryptojacking samples and achieved a 100 percent detection accuracy rate in simulation.…”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
7
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…This study proposes a car parking management system which applies Dijkstra’s algorithm, Ant Colony Optimization (ACO) and Binary Search Tree (BST) in structuring a guidance system for indoor parking. …”
Get full text
Get full text
Thesis -
8
Modified sequential fences for identifying univariate outliers
Published 2016“…Sequential fences method is modified by replacing interquartile range with various robust scales such as semi-interquartile range, , median absolute deviation ( ) and Gini’s mean difference ( ) in order to improve outlier detection in symmetric distribution. Ultimately, the utilisation of in sequential fences seems to demonstrate a comparable accuracy in detecting the contaminated data. …”
Get full text
Get full text
Thesis -
9
Identification and mitigation of non-line-of-sight path effect using repeater for hybrid ultra-wideband positioning and networking system
Published 2021“…From the simulation results, the NLOS paths have been successfully identified under the NLOS environment. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article
