Search Results - (( variable activation connection algorithm ) OR ( java extraction using algorithmic ))

Refine Results
  1. 1

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis outlines the two different implementation techniques of the existing FLEX algorithm using java based parsers and using a query language for XML. …”
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3

    Mapreduce algorithm for weather dataset by Khalid Adam, Ismail Hammad

    Published 2017
    “…This original dataset is stored in Hadoop Distributed File System. Next, MapReduce Algorithm is developed using Java programming. The algorithm is tested using small and big dataset. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde by Ogunfolajin Maruff , Tunde

    Published 2022
    “…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    MapReduce algorithm for weather dataset by Majid, Mazlina A., Romli, Awanis, Ahmad, Noraziah, Hammad, Khalid Adam Ismail

    Published 2018
    “…This original dataset is stored in Hadoop Distributed File System. Next, MapReduce Algorithm is developed using Java programming. The algorithm is tested using small and big dataset. …”
    Get full text
    Get full text
    Research Report
  6. 6

    Enhancement of a grid-connected dfig wind turbine system using fractional order PI controllers by Veerendra, Arigela Satya, Vasavi Uma Maheswari, M., Peddakapu, Kurukuri, Punya Sekhar, Ch

    Published 2023
    “…Furthermore, in the validation of the proposed algorithm, the performance parameters like DC coupling capacitor voltage, rotor Speed, active power, and reactive power with PI, FOPI, PSO-FOPI, and ALO-FOPI regulators are compared and analysed using the bode plot are presented. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Bayesian logistic regression model on risk factors of type 2 diabetes mellitus by Chiaka, Emenyonu Sandra

    Published 2016
    “…Logistic regression model has long been known and it is commonly used in analysing a binary outcome or dependent variable and connects the binary dependent variable to several independent variables. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Image clustering comparison of two color segmentation techniques by Subramaniam, Kavitha Pichaiyan

    Published 2010
    “…Finally, the algorithm found, which would solve the image segmentation problem.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    Face classification for three major ethnic of Orang Asli using Back Propagation Neural Network / Nor Intan Shafini Nasaruddin by Nasaruddin, Nor Intan Shafini

    Published 2012
    “…The image classification prototype is developed by using JAVA programming language which is based on supervised learning algorithm, Backpropagation Neural Network. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography by Naji, Ahmed Wathik, Zaidan, B.B., Hameed, Shihab A., O-Khalifa, Othman

    Published 2009
    “…The system includes two main functions; first is the hiding of the information in unused area 2 of PE-file (.EXE file), through the execution of four process (specify the cover file, specify the information file, encryption of the information, and hiding the information) and the second function is the extraction of the hiding information through three process (specify the steno file, extract the information, and decryption of the information) and The proposed system is implemented by using java.…”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Development Of Machine Learning User Interface For Pump Diagnostics by Lee, Zhao Yang

    Published 2022
    “…The features extracted of time domain and frequency domain in vibration and acoustic will use as database of a Support Vector Machine (SVM) algorithms by using MATLAB R2021a. …”
    Get full text
    Get full text
    Monograph
  12. 12

    A Fuzzy-Based PI Controller for Power Management of a Grid-Connected PV-SOFC Hybrid System by Sukumar, S., Marsadek, M., Ramasamy, A., Mokhlis, Hazlie, Mekhilef, Saad

    Published 2017
    “…This paper presents a power management system for a grid-connected PV and solid oxide fuel cell (SOFC), considering variation in the load and solar radiation. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…An attacker can easily reconstruct source code from such intermediate formats to extract sensitive information such as proprietary algorithms present in the software. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Microgrid multi-distributed energy resources for power management network stability / Bilal Mouneir Saeed Eid by Bilal Mouneir, Saeed Eid

    Published 2016
    “…The impact on the active and reactive powers, by ambient disturbances such as solar radiation with severe disturbances, and variable PV cell temperature, are investigated. …”
    Get full text
    Get full text
    Thesis
  15. 15

    A malware analysis and detection system for mobile devices / Ali Feizollah by Ali, Feizollah

    Published 2017
    “…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17

    Artificial Neural Network-Forecasted Compression Strength of Alkaline-Activated Slag Concretes by Yi, Xuan Tang, Yeong, Huei Lee, Mugahed, Amran, Roman, Fediuk, Nikolai, Vatin, Beng, Ahmad Hong Kueh, Yee, Yong Lee

    Published 2022
    “…To identify the parametric influence, the individual relative importance of each input variable was determined through a sensitivity analysis using the connection weight approach, whose results indicated that the silica modulus of the activator and sodium silicate greatly affected the AASC compressive strength. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    A peer-to-peer blockchain based interconnected power system by Ahmed, Musse Mohamud, Mohammad Kamrul, Hasan, Muhammad, Shafiq, Md Ohirul, Qays, Gadekallu, Thippa Reddy, Nebhen, Jamel, Shayla, Islam

    Published 2021
    “…This paper uses a Shunt Active Power Filter (SHAPF). It describes the simulation analysis and reduction of harmonics detection in a peer-to-peer interconnected 3-phase power system with the help of an FFT algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Centre based evolving clustering framework with extended mobility features for vehicular ad-hoc networks by Talib, Mohammed Saad

    Published 2021
    “…Vehicular Ad hoc Network (VANET) clustering is an active research area where a group of connected vehicles forms an ad hoc network. …”
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    Prediction and multi-criteria-based schemes for seamless handover mechanism in mobile WiMAX networks by Mubarak, Mohammed Awadh Ahmed Ben

    Published 2013
    “…It reduces the number of handovers by 29.7% and 26.9%, respectively, compared to the conventional RSSI based handover algorithm and the previous worked, mobility improved handover (MIHO) algorithm. …”
    Get full text
    Get full text
    Thesis