Search Results - (( data distribution mining algorithm ) OR ( _ evaluation ((under algorithm) OR (new algorithm)) ))
Search alternatives:
- distribution mining »
- data distribution »
- mining algorithm »
- under algorithm »
- new algorithm »
-
1
Predicting Customer Buying Decisions for Online Shopping with Unbalanced Data Set
Published 2022“…Weka, a data mining tool, provides the facility to classify the data set with different machine learning algorithms. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
2
Building classification models from imbalanced fraud detection data / Terence Yong Koon Beh, Swee Chuan Tan and Hwee Theng Yeo
Published 2014“…We evaluated the models generated from seven classification algorithms with two simple data balancing techniques. …”
Get full text
Get full text
Get full text
Article -
3
-
4
New perturb and observe algorithm based on trapezoidal rule: uniform and partial shading conditions
Published 2022“…The proposed Trapezoidal rule based P&O algorithm is evaluated under three conditions: (1) under uniform irradiance (2) under shading conditions and (3) under sudden and step changes in irradiation levels as well as the transition between shading patterns. …”
Get full text
Get full text
Article -
5
Experimental evaluation of bottleneck link utilization with new-additive increase multiplicative decrease congestion avoidance and control algorithm.
Published 2009“…Approach: In this research we continued to study the performances of the New-Additive Increase Multiplicative Decrease (AIMD) algorithm as one of the core protocols for TCP congestion avoidance and control mechanism, we want now to evaluate the effect of using the AIMD algorithm after developing it to find a new approach, as we called it the New-AIMD algorithm to measure the bottleneck link utilization and use the NCTUns simulator to get the results after make the modification of the mechanism. …”
Get full text
Get full text
Article -
6
Hybrid moth flame optimization mppt algorithm for accurate real-time tracking under partially shaded photovoltaic system
Published 2021“…In addition, with the continuous improvement effort and the possibility of a new-comer algorithm can show superior results on the current problem, a new MFO based MPPT algorithm was proposed. …”
Get full text
Get full text
Thesis -
7
-
8
Improved ADALINE Harmonics Extraction Algorithm for Boosting Performance of Photovoltaic Shunt Active Power Filter under Dynamic Operations
Published 2016“…For evaluation and comparison purposes, both proposed and existing algorithms have been developed. …”
Get full text
Get full text
Article -
9
Improved ADALINE harmonics extraction algorithm for boosting performance of photovoltaic shunt active power filter under dynamic operations
Published 2016“…For evaluation and comparison purposes, both proposed and existing algorithms have been developed. …”
Get full text
Get full text
Get full text
Article -
10
The delay with new-additive increase multiplicative decrease congestion avoidance and control algorithm.
Published 2010“…In this research we continued to study the performances of the New-Additive Increase Multiplicative Decrease (AIMD) algorithm as one of the core protocols for TCP congestion avoidance and control mechanism, we want now to evaluate the effect of using the New-AIMD algorithm to measure the queue length and end-to-end delays and we will use the NCTUns simulator to get the results after make the modification of the mechanism. …”
Get full text
Get full text
Article -
11
Performance evaluation and enhancement of EDCA protocol to improve the voice capacity in wireless network
Published 2017“…The OPNET simulator and the mathematical model were used to evaluate the performance for the proposed algorithm. …”
Get full text
Get full text
Get full text
Thesis -
12
A cylindrical coordinate system with dynamic permutation table for blowfish algorithm
Published 2014“…The Blowfish Algorithm (BA) is a symmetric block cipher that iterates simple encryption and decryption functions by using Feistel networks.BA keys vary from 32-448 bits to ensure a high level of security.However, the BA requires a high memory percentage and it has a problem regarding randomness of output with text and image files having large strings of identical bytes.One solution to the seissues is to design a new Cryptography algorithm based on the BA that incorporates an F-function into a Cylindrical Coordinate System (CCS).The resulting F-function is known as a CCS with a Dynamic Permutation Table (DPT) or CCSDPT whereas the new algorithm is called the New BA (NBA).The objectives of the CCSDPT are to reduce memory requirements, enhance the randomness of the output and increase resistance to attacks through byte relocation and transformation in the right cylinder.NBA is evaluated by investigates the output of the algorithm by using statistical tests from the National Institute of Standard and Technology (NIST) with five types of data and compared with the BA.The findings of the NIST tests show that the NBA is suitable for any data stream, even those with long strings of identical bytes. …”
Get full text
Get full text
Get full text
Article -
13
Operation of three-level inverter-based shunt active power filter under nonideal grid voltage conditions with dual fundamental component extraction
Published 2018“…Design concept and effectiveness of the proposed algorithm are thoroughly studied and evaluated in MATLAB-Simulink. …”
Get full text
Get full text
Article -
14
Photovoltaic System with INC MPPT Algorithm in MATLAB Simulink
Published 2013“…Simulation results show that the MPPT with INC algorithm offers the best performance in terms of its fastest response in tracking new MPP and highest efficiency under rapid change of irradiance level.…”
-
15
-
16
Formulation of invariants for discrete orthogonal moments and image classification / Pee Chih Yang
Published 2013“…Therefore new sets of invariant algorithms have been proposed to resolve the above mentioned issues. …”
Get full text
Get full text
Thesis -
17
Evaluation of Vector Evaluated Particle Swarm Optimisation Enhanced with Non-dominated Solutions and Multiple Nondominated Leaders based on WFG Test Functions
Published 2014“…Multi Objective Optimisation (MOO) problem involves simultaneous minimization or maximization of many objective functions. One of MOO algorithms is Vector Evaluated Particle Swarm Optimization (VEPSO) algorithm. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
18
Satisfiable Integer Programming Algorithm On Distributed Inter Process Communication (SIP-DIPC)
Published 2019“…Data Analytics is a superset to Data Mining. Data mining algorithm is getting popular support in recent development of Big Data. …”
Get full text
Get full text
Get full text
Article -
19
Dynamic obstacle handling in multi-robot coverage
Published 2024“…The Modified Lloyd’s algorithm was also tested under two different scenarios to evaluate its functionality. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
20
An alternative approach to normal parameter reduction algorithms for decision making using a soft set theory / Sani Danjuma
Published 2017“…Finally, to evaluate the proposed algorithm, thorough experimentation on both real life and synthetic binary-valued data set were performed. …”
Get full text
Get full text
Get full text
Thesis
