Search Results - (( model implication ((from algorithm) OR (tree algorithm)) ) OR ( _ protection based algorithm ))
Search alternatives:
- model implication »
- protection based »
- from algorithm »
- tree algorithm »
- _ protection »
-
1
Prediction models of heritage building based on machine learning / Nur Shahirah Ja'afar
Published 2021“…These algorithms were developed by using prewar shophouses dataset from 2004 until 2018 based on factors of heritage properties. …”
Get full text
Get full text
Thesis -
2
Not seeing the forest for the trees: Generalised linear model out-performs random forest in species distribution modelling for Southeast Asian felids
Published 2023“…Two of the most frequently applied algorithms to model species-habitat relationships are Generalised Linear Models (GLM) and Random Forest (RF). …”
Get full text
Get full text
Article -
3
Using predictive analytics to solve a newsvendor problem / S. Sarifah Radiah Shariff and Hady Hud
Published 2023“…The assumptions adopted in the Decision Tree Model and K-Nearest Neighbour are derived from symbolic artificial intelligence and data mining, whilst the assumptions in the Artificial Neural Network are derived from the connectionist approach. …”
Get full text
Get full text
Book Section -
4
Diagnosis and recommender system for diabetes patient using decision tree / Nurul Aida Mohd Zamary
Published 2024“…This project aims to develop a decision-making support model for diabetes diagnosis and treatment recommendation using the decision tree algorithm. …”
Get full text
Get full text
Thesis -
5
Laptop price prediction using decision tree algorithm / Nurnazifah Abd Mokti
Published 2024“…This research project focuses on developing a laptop price prediction model using the decision tree algorithm based on laptop specifications. …”
Get full text
Get full text
Thesis -
6
Implications of climate change damage for agriculture: sectoral evidence from Pakistan
Published 2023Article -
7
XAIRF-WFP: a novel XAI-based random forest classifier for advanced email spam detection
Published 2024“…Traditional machine learning algorithms such as Logistic Regression (LR), K-Nearest Neighbors (KNN), Decision Trees (DT), and Support Vector Machines (SVM) have been employed to mitigate this challenge. …”
Get full text
Get full text
Get full text
Article -
8
Evaluation of SongketChain : A Framework to Protect Unique Cultural Product using Blockchain Technology
Published 2025“…The findings demonstrate that blockchain technology can play a crucial role in protecting cultural heritage, offering a replicable model for other traditional crafts facing similar challenges. …”
Get full text
Get full text
Get full text
Get full text
Article -
9
-
10
The predictive machine learning model of a hydrated inverse vulcanized copolymer for effective mercury sequestration from wastewater
Published 2024“…NMDG functionalized IVP removed 100 Hg2+ from a low feed concentration (10â��50 mg/l). A predictive machine learning model was also developed to predict the amount of mercury removed () using GPR, ANN, Decision Tree, and SVM algorithms. …”
Get full text
Get full text
Article -
11
-
12
A novel MPPT algorithm for load protection based on output sensing control
Published 2011“…This paper presents a novel maximum power point tracking (MPPT) algorithm for load protection based on output sensing control. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
13
Discovering decision algorithm of distance protective relay based on rough set theory and rule quality measure
Published 2011“…A distance protective relay performance analysis is only feasible when the hypothesis of expected relay operation characteristics as decision rules is established as the knowledge base. …”
Get full text
Get full text
Thesis -
14
Genetic algorithm-based optimization of overcurrent relay Coordination for improved protection of DFIG operated wind farms
Published 2019“…Therefore, this article proposes a novel genetic algorithm (GA)-based optimization technique for proper coordination of the OCRs in order to provide improved protection of the wind farms. …”
Get full text
Get full text
Article -
15
Genetic algorithm based optimization of overcurrent relay coordination for improved protection of DFIG operated wind farms
Published 2018“…Therefore, this research proposes a novel genetic algorithm (GA) based optimization for proper coordination of OCRs to improve their functions for protection of wind farms. …”
Get full text
Get full text
Conference or Workshop Item -
16
Special protection and control scheme based on generation rescheduling using differential evolution and electromagnetism-like algorithm
Published 2016“…The main objective of this research is designing a Special Protection and Control Scheme (SPCS) based on a hybrid approach of combining Differential Evolution (DE) and Electromagnetism-Like algorithms. …”
Get full text
Get full text
Thesis -
17
Rough-Set-and-Genetic-Algorithm based data mining and Rule Quality Measure to hypothesize distance protective relay operation characteristics from relay event report
Published 2011“…This paper investigates the implementation of a novel data mining approach of integrated-Rough-Set-and-Genetic-Algorithm based rule discovery and Rule Quality Measure to hypothesize expected relay behavior in the form of an association rule from digital protective relay’s resident event report. …”
Get full text
Get full text
Article -
18
Chaotic-based encryption algorithm using henon and logistic maps for fingerprint template protection
Published 2020“…Many past studies proposed fingerprint template protection (FTP) using chaotic-based encryption algorithms that are more suitable to secure images than conventional encryption such as DES, AES, and RSA. …”
Get full text
Get full text
Get full text
Article -
19
Biometric Template Protection based on Hill Cipher Algorithm with Two Invertible Keys
Published 2018“…In this paper we proposed an efficient encryption method based on two invertible and random keys to enhance and overcome the weakness of hill cipher algorithm the keys generated using upper triangular matrices with Pseudo-Random Number Generator (PRNG) using two large and random encryption keys. …”
Get full text
Get full text
Get full text
Article -
20
Discovering decision algorithm from a distance relay event report
Published 2009“…This derived algorithm, aptly known as relay CD-prediction rules, can later be used as a knowledge base in support of a protection system analysis expert system to predict, validate or even diagnose future unknown relay events. …”
Get full text
Get full text
Get full text
Article
