Academic literature on the topic 'WEKA Software'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'WEKA Software.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "WEKA Software"

1

Hall, Mark, Eibe Frank, Geoffrey Holmes, Bernhard Pfahringer, Peter Reutemann, and Ian H. Witten. "The WEKA data mining software." ACM SIGKDD Explorations Newsletter 11, no. 1 (2009): 10–18. http://dx.doi.org/10.1145/1656274.1656278.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Komarudin, Rachman, Puspa Vicenna Barulah Yudha, Yana Iqbal Maulana, Nurul Afni, Agus Salim, and Irmawati Carolina. "Penerapan Metode Algoritma C4.5 Dalam Klasifikasi Diagnosa Penyakit Umum Menggunakan WEKA." Bianglala Informatika 9, no. 2 (2021): 95–102. http://dx.doi.org/10.31294/bi.v9i2.11537.

Full text
Abstract:
Kurangnya pengetahuan terhadap penyakit seperti DBD,Tifus dan ISPA yang disebabkan oleh virus perlu adanya tindakan atau penanganan secara cepat. Algoritma C4.5 merupakan klasifikasi yang mendapatkan hasil pohon keputusan yang mudah diinpretasikan. Penelitian ini bertujuan untuk mengetahui gejala-gejala penyakit yang disebabkan oleh virus seperti penyakit DBD (Demam Berdarah Dengue),Tifus dan ISPA (Infeksi Saluran Pernafasan Atas) menggunakan 4 parameter yaitu jenis kelamin,usia,keluhan dan suhu tubuh. Penelitian adalah mengklasifikasikan penyakit DBD,Tifus dan ISPA. Metode penelitian yang digunakan adalah data kuantitatif. Penelitian ini datanya didapat dari data sekunder. Metode yang digunakan yaitu Algoritma C4.5. Software yang dipakai untuk melihat hasil penelitian yang dibahas yaitu: software Weka 3.9. Hasil pembahasan pada software weka 3.9, tingkat akurasi data sebesar 64.2857 % atau 27 data dan dari tinggkat error sekitar 35.7134% atau 15 data. Dari data 42 jumlah kasus pasien puskesmas pujer kota bondowoso yang terkena penyakit seperti DBD, Tifus dan ISPA sehingga dapat disimpulkan bahwa yang di implementasikan kedalam software weka 3.9 dapat membantu puskesmas pujer dalam mandiagnosa penyakit umum.Lack of knowledge about diseases such as dengue fever, typhoid and ARI caused by viruses requires immediate action or treatment. The C4.5 algorithm is a classification that gets decision tree results that are easy to interpret. This study aims to determine the symptoms of diseases caused by viruses such as DHF (Dengue Hemorrhagic Fever), Typhus and ARI (Upper Respiratory Tract Infection) using 4 parameters, namely gender, age, complaints and body temperature. The research is to classify the diseases of DHF, Typhus and ARI. The research method used is quantitative data. This research data obtained from secondary data. The method used is the C4.5 algorithm. The software used to view the research results discussed are: Weka 3.9 software. The results of the discussion on the Weka 3.9 software, the data accuracy rate is 64.2857 % or 27 data and the error rate is around 35.7134% or 15 data. From the data of 42 cases of patients at Pujer Public Health Center in Bondowoso City who were affected by diseases such as DHF, Typhus and ISPA, it can be concluded that what is implemented into the Weka 3.9 software can help Pujer Health Center in diagnosing common diseases
APA, Harvard, Vancouver, ISO, and other styles
3

Wu, Fang Jun. "Empirical Tests of Scale-Free Characteristic in Open Source Software: A Replicated Case Study." Advanced Materials Research 622-623 (December 2012): 1933–36. http://dx.doi.org/10.4028/www.scientific.net/amr.622-623.1933.

Full text
Abstract:
Open source software systems are becoming increasingly important these days and will grow stronger in the future. In order to gain more information about them, their structure characteristics and behavior characteristics need to be measured. This paper tests scale free characteristics on open source real-world software empirically. More specially, this paper checks whether Chidamber and Kemerer metrics suite follows power law or not through three versions of Weka. Our empirical results showed that the features of complex networks didn’t exist in Weka.
APA, Harvard, Vancouver, ISO, and other styles
4

Azwanti, Nurul. "ALGORITMA C4.5 UNTUK MEMPREDIKSI MAHASISWA YANG MENGULANG MATA KULIAH (STUDI KASUS DI AMIK LABUHAN BATU)." Simetris: Jurnal Teknik Mesin, Elektro dan Ilmu Komputer 9, no. 1 (2018): 11–22. http://dx.doi.org/10.24176/simet.v9i1.1627.

Full text
Abstract:
Penelitian ini dilakukan untuk memprediksi mahasiswa yang mengulang mata kuliah di AMIK Labuhan Batu dengan menggunakan teknik Data Mining. Algoritma C4.5 merupakan teknik Data Mining yang dapat melakukan prediksi dengan mengolah variabel Semester, IPK, Nilai, Keadaan Ekonomi dan Status. Variabel tersebut akan diklasifikasikan berdasarkan atributnya, untuk variabel keadaan ekonomi pengklasifikasian akan menggunakan rumus Sturgess agar dapat melakukan pengolahan data. Algoritma C4.5 dengan metode pohon keputusan dapat memberikan informasi rule prediksi untuk menggambarkan proses yang terkait dengan prediksi mahasiswa yang mengulang. Karakteristik data yang diklasifikasi dapat diperoleh dengan jelas, baik dalam bentuk struktur pohon keputusan maupun aturan sehingga dalam tahap pengujian dengan software WEKA dapat membantu dalam memprediksi mahasiswa yang mengulang mata kuliah. Dari dua hasil pengujian yang telah dilakukan yaitu proses secara manual dan menggunakan software WEKA disimpulkan bahwa hasil pengujian sangat baik karena rule yang dihasilkan hampir sama. Perbedaannya hanya terletak pada atribut nilai yang masuk ke dalam WEKA, namun tidak megubah hasil keputusan. Pada hitungan manual menggunakan 34 record dan pada WEKA menggunakan 141 record.Kata kunci: data mining, algoritma C4.5, klasifikasi, pohon keputusan
APA, Harvard, Vancouver, ISO, and other styles
5

Abednego, Luciana, and Cecilia Esti Nugraheni. "Forex Data Analysis using Weka." International Journal of Fuzzy Logic Systems 11, no. 1 (2021): 23–36. http://dx.doi.org/10.5121/ijfls.2021.11103.

Full text
Abstract:
This paper conducts some experiments with forex trading data. The data being used is from kaggle.com, a website that provides datasets for machine learning and data scientists. The goal of the experiments is to know how to design many parameters in a forex trading robot. Some questions that want to be investigated are: How far the robot must set the stop loss or target profit level from the open position? When is the best time to apply for a forex robot that works only in a trending market? Which one is better: a forex trading robot that waits for a trending market or a robot that works during a sideways market? To answer these questions, some data visualizations are plotted in many types of graphs. The data representations are built using Weka, an open-source machine learning software. The data visualization helps the trader to design the strategy to trade the forex market.
APA, Harvard, Vancouver, ISO, and other styles
6

International, Journal of Fuzzy Logic Systems (IJFLS). "Forex Data Analysis using Weka." International Journal of Fuzzy Logic Systems (IJFLS) 11, no. 1 (2023): 14. https://doi.org/10.5121/ijfls.2021.11103.

Full text
Abstract:
This paper conducts some experiments with forex trading data. The data being used is from kaggle.com, a website that provides datasets for machine learning and data scientists. The goal of the experiments is to know how to design many parameters in a forex trading robot. Some questions that want to be investigated are: How far the robot must set the stop loss or target profit level from the open position? When is the best time to apply for a forex robot that works only in a trending market? Which one is better: a forex trading robot that waits for a trending market or a robot that works during a sideways market? To answer these questions, some data visualizations are plotted in many types of graphs. The data representations are built using Weka, an open-source machine learning software. The data visualization helps the trader to design the strategy to trade the forex market.
APA, Harvard, Vancouver, ISO, and other styles
7

Kamble, Nikhil, Atharva Phatak, Aaryan Joshi, Rahul Adhao, and Vinod Pachghare. "Exploring the efficiency : A comprehensive analysis of machine learning algorithms in WEKA software." Journal of Statistics and Management Systems 27, no. 5 (2024): 1009–19. http://dx.doi.org/10.47974/jsms-1299.

Full text
Abstract:
In data science, choosing the right machine learning algorithms is essential for getting the best possible predicted performance. To investigate the effectiveness of different machine learning algorithms, a thorough analysis is conducted within the WEKA software framework. A suitable venue for this investigation is WEKA, a popular platform for machine learning and data mining activities that offers a wide range of algorithms. Our study compares and assesses the effectiveness of several machine learning algorithms on various datasets, taking into account variables like scalability, accuracy, and computing economy. Using a strict approach, analyses for patterns and trends provide insight into the advantages and disadvantages of particular algorithms in different contexts. The research attempted to utilize many machine learning algorithms to determine the accuracy of the dataset after deleting particular fields.
APA, Harvard, Vancouver, ISO, and other styles
8

Mulia, Isnan, and Muanas Muanas. "Model Prediksi Kelulusan Mahasiswa Menggunakan Decision Tree C4.5 dan Software Weka." JAS-PT (Jurnal Analisis Sistem Pendidikan Tinggi Indonesia) 5, no. 1 (2021): 71. http://dx.doi.org/10.36339/jaspt.v5i1.417.

Full text
Abstract:
In this research, we build a model to predict graduation status of students in Institut Bisnis dan Informatika Kesatuan using C4.5 decision tree algorithm. The prediction model is built using students’ GPA from semester 1 to semester 4, for students with admission year of 2013 to 2016. The prediction model obtained is a decision tree with 26 rules, with the attribute IPS_4 being the attribute that determines the graduation label of students. This prediction model yields an accuracy of 73%, a result that is not good enough. This result is probably due to unbalanced proportion of the data used.
APA, Harvard, Vancouver, ISO, and other styles
9

Putta, Srinivasa Rao. "Comparative Analysis of Data Mining With Big Data Using WEKA Software Tool." International Journal of Computer Sciences and Engineering 7, no. 6 (2019): 713–15. http://dx.doi.org/10.26438/ijcse/v7i6.713715.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Baginda, Baginda. "Implementasi Data Mining Dalam Pemilihan Laptop Berbasis Algoritma C4.5 Pada Software WEKA." Jurnal Minfo Polgan 12, no. 1 (2023): 1065–73. http://dx.doi.org/10.33395/jmp.v12i1.12582.

Full text
Abstract:
Kemajuan globalisasi saat ini memberikan dampak yang kuat di berbagai bidang teknologi. Laptop atau komputer portabel adalah komputer kecil dan ringan sehingga dapat membawanya ke mana saja tentu tergantung pada ukuran, bahan dan spesifikasi laptop tentu menjadi proritas utama yang sangat dipertimbangkan sebelum membelinya. Penggunaan laptop sama seperti komputer yang dapat membantu kita untuk menyelesaian tugas, melakukan pekerjaan dengan baik dan cepat. Orang terkadang punya laptop banyak permainan untuk memberikan hiburan. Toko Jaya Utama Medan adalah toko yang menawarkan berbagai macam laptop. Terlalu banyak jenis laptop membuat konsumen sulit untuk memilih laptop mana yang akan dipilih karena sulit memberikan informasi dari pihak toko jelas bagi konsumen. Kemudian juga membutuhkan teknik data mining C4.5 Algoritma dimana teknik ini mengklasifikasikan pemilihan laptop yang baik berdasarkan variabel harga, jumlah RAM, prosesor, ukuran, daya tahan baterai. Kebenaran data yang diproses diperiksa di aplikasi WEKA dengan menggunakan Algoritma C4.5. Hasil ini diperoleh dengan mencari nilai entropi. Dan keuntungan dari semua variabel menghasilkan pohon keputusan. Maka dengan hal itu ada tiga variabel yang sangat mempengaruhi pemilihan laptop, yaitu harga, prosesor dan masa pakai baterai. Untuk total 80 data yang dipilihkan untuk memilih laptop yang benar hanya 27, yang salah 53.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "WEKA Software"

1

Haus, Gerson Luiz. "Identificação de tráfego bittorrent com fins periciais utilizando Weka." reponame:Repositório Institucional da UnB, 2012. http://repositorio.unb.br/handle/10482/12591.

Full text
Abstract:
Dissertação (mestrado)—Universidade de Brasília, Faculdade de Tecnologia, Departamento de Engenharia Elétrica, 2012.<br>Submitted by Alaíde Gonçalves dos Santos (alaide@unb.br) on 2013-03-13T11:31:05Z No. of bitstreams: 1 2012_GersonLuizHaus.pdf: 957180 bytes, checksum: f9c596d9013a74353fb90cf2ae82584d (MD5)<br>Approved for entry into archive by Guimaraes Jacqueline(jacqueline.guimaraes@bce.unb.br) on 2013-03-26T11:30:30Z (GMT) No. of bitstreams: 1 2012_GersonLuizHaus.pdf: 957180 bytes, checksum: f9c596d9013a74353fb90cf2ae82584d (MD5)<br>Made available in DSpace on 2013-03-26T11:30:30Z (GMT). No. of bitstreams: 1 2012_GersonLuizHaus.pdf: 957180 bytes, checksum: f9c596d9013a74353fb90cf2ae82584d (MD5)<br>O trabalho descrito nesta dissertação objetiva identificação de tráfego de rede proveniente de interceptação telemática judicialmente autorizada utilizando WEKA (Waikato Environment for Knowledge Analysis).Propõe-se o desenvolvimento de um método de identificação do tráfego de rede gerado pelo aplicativo P2P (peer-to-peer) BitTorrent. Com a identificação do fluxo de rede do BitTorrent podem ser obtidas informações periciais importantes tais como: provas de materialidade, delimitação geográfica dos locais para onde foram transferidos arquivos, entre outras informações. A proposta deste trabalho emprega o conjunto de ferramentas WEKA, com o uso do algoritmo J.48 (baseado no C4.5) e SVM (Support Vector Machine), para classificar o fluxo de dados que utilizou criptografia. Como resultado experimental, foram detectados até 97,03% do tráfego criptografado. Os resultados experimentais alcançados demonstram a viabilidade da utilização do WEKA para a identificação de tráfego do BitTorrent. _______________________________________________________________________________________ ABSTRACT<br>The work described in this thesis aims at identifying network traffic from interception telematics judicially authorized using WEKA (Waikato Environment for Knowledge Analysis). It is proposed the development of a method for the identification of network traffic generated by P2P (peer-to-peer) application BitTorrent. With the identification of the BitTorrent network flow information can be obtained important expert such as: proofs of materiality, geographical boundaries of sites for which they have been transferred files, among other information. The proposal of this work employs the WEKA toolset, using J.48 (based on C4.5) and SVM (Support Vector Machine)algorithms, to sort the data flow that uses encryption. As a result, 97.03% of the encrypted traffic were detectThe experimental results achieved demonstrate the feasibility of using WEKA for identifying BitTorrent traffic.
APA, Harvard, Vancouver, ISO, and other styles
2

Schauerhuber, Michael, Achim Zeileis, David Meyer, and Kurt Hornik. "Benchmarking Open-Source Tree Learners in R/RWeka." Department of Statistics and Mathematics, WU Vienna University of Economics and Business, 2007. http://epub.wu.ac.at/1496/1/document.pdf.

Full text
Abstract:
The two most popular classification tree algorithms in machine learning and statistics - C4.5 and CART - are compared in a benchmark experiment together with two other more recent constant-fit tree learners from the statistics literature (QUEST, conditional inference trees). The study assesses both misclassification error and model complexity on bootstrap replications of 18 different benchmark datasets. It is carried out in the R system for statistical computing, made possible by means of the RWeka package which interfaces R to the open-source machine learning toolbox Weka. Both algorithms are found to be competitive in terms of misclassification error - with the performance difference clearly varying across data sets. However, C4.5 tends to grow larger and thus more complex trees. (author's abstract)<br>Series: Research Report Series / Department of Statistics and Mathematics
APA, Harvard, Vancouver, ISO, and other styles
3

Ferris, Michael Charles. "Weak sharp minima and penalty functions in mathematical programming." Thesis, University of Cambridge, 1988. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.292969.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Rundquist, Victor Frederic. "Weak signal reception using software defined radios and a two-element antenna array." Auburn, Ala., 2006. http://repo.lib.auburn.edu/2006%20Summer/Theses/RUNDQUIST_VICTOR_6.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Nimal, Vincent P. J. "Static analyses over weak memory." Thesis, University of Oxford, 2014. http://ora.ox.ac.uk/objects/uuid:469907ec-6f61-4015-984e-7ca8757b992c.

Full text
Abstract:
Writing concurrent programs with shared memory is often not trivial. Correctly synchronising the threads and handling the non-determinism of executions require a good understanding of the interleaving semantics. Yet, interleavings are not sufficient to model correctly the executions of modern, multicore processors. These executions follow rules that are weaker than those observed by the interleavings, often leading to reorderings in the sequence of updates and readings from memory; the executions are subject to a weaker memory consistency. Reorderings can produce executions that would not be observable with interleavings, and these possible executions also depend on the architecture that the processors implement. It is therefore necessary to locate and understand these reorderings in the context of a program running, or to prevent them in an automated way. In this dissertation, we aim to automate the reasoning behind weak memory consistency and perform transformations over the code so that developers need not to consider all the specifics of the processors when writing concurrent programs. We claim that we can do automatic static analysis for axiomatically-defined weak memory models. The method that we designed also allows re-use of automated verification tools like model checkers or abstract interpreters that were not designed for weak memory consistency, by modification of the input programs. We define an abstraction in detail that allows us to reason statically about weak memory models over programs. We locate the parts of the code where the semantics could be affected by the weak memory consistency. We then provide a method to explicitly reveal the resulting reorderings so that usual verification techniques can handle the program semantics under a weaker memory consistency. We finally provide a technique that synthesises synchronisations so that the program would behave as if only interleavings were allowed. We finally test these approaches on artificial and real software. We justify our choice of an axiomatic model with the scalability of the approach and the runtime performance of the programs modified by our method.
APA, Harvard, Vancouver, ISO, and other styles
6

Márki, András. "On Software Testing and Subsuming Mutants : An empirical study." Thesis, Högskolan i Skövde, Institutionen för informationsteknologi, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-10595.

Full text
Abstract:
Mutation testing is a powerful, but resource intense technique for asserting software quality. This report investigates two claims about one of the mutation operators on procedural logic, the relation operator replacement (ROR). The constrained ROR mutant operator is a type of constrained mutation, which targets to lower the number of mutants as a “do smarter” approach, making mutation testing more suitable for industrial use. The findings in the report shows that the hypothesis on subsumption is rejected if mutants are to be detected on function return values. The second hypothesis stating that a test case can only detect a single top-level mutant in a subsumption graph is also rejected. The report presents a comprehensive overview on the domain of mutation testing, displays examples of the masking behaviour previously not described in the field of mutation testing, and discusses the importance of the granularity where the mutants should be detected under execution. The contribution is based on literature survey and experiment. The empirical findings as well as the implications are discussed in this master dissertation.
APA, Harvard, Vancouver, ISO, and other styles
7

Goosen, Ryno Johannes. "Sense, signal and software : a sensemaking analysis of meaning in early warning systems." Thesis, Stellenbosch : Stellenbosch University, 2014. http://hdl.handle.net/10019.1/96132.

Full text
Abstract:
Thesis (MPhil)--Stellenbosch University, 2014.<br>ENGLISH ABSTRACT: This thesis considers the contribution that Karl Weick’s notion of sensemaking can make to an improved understanding of weak signals, cues, warning analysis, and software within early warning systems. Weick’s sensemaking provides a framework through which the above mentioned concepts are discussed and analysed. The concepts of weak signals, early warning systems, and Visual Analytics are investigated from within current business and formal intelligence viewpoints. Intelligence failure has been a characteristic of events such as 9/11, the recent financial crisis triggered by the collapse of Lehman Brothers, and the so-called Arab Spring. Popular methodologies such as early warning analysis, weak signal analysis and environmental scanning employed within both the business and government sphere failed to provide adequate early warning in many of these events. These failures warrant renewed attention as to what improvements can be made and how new technology can enhance early warning analysis. Chapter One is introductory and states the research question, methodology, and delimits the thesis. Chapter Two sets the scene by investigating current conceptions of the main constructs. Chapter Three explores Weick’s theory of sensemaking, and provides the analytical framework against which these concepts are then analysed in Chapter Four. The emphasis is directed towards the extent of integration of frames within the analysis phase of early warning systems and how frames may be incorporated within the theoretical foundation of Visual Analytics to enhance warning systems. The findings of this thesis suggest that Weick’s conceptualisation of sensemaking provide conceptual clarity to weak signal analysis in that Weick’s “seed” metaphor, representing the embellishment and elaboration of cues, epitomizes the progressive nature of weak signals. The importance of Weick’s notion of belief driven sensemaking, in specific the role of expectation in the elaboration of frames, and discussed and confirmed by various researchers in different study areas, is a core feature underlined in this thesis. The centrality of the act of noticing and the effect that framing and re-framing has thereon is highlighted as a primary notion in the process of not only making sense of warning signals but identifying them in the first place. This ties in to the valuable contribution Weick’s sensemaking makes to understanding the effect that a specification has on identifying transients and signals in the resulting visualization in Visual Analytic software.<br>AFRIKAANSE OPSOMMING: Hierdie tesis ondersoek hoe Karl Weick se konsep van singewing ons insig teenoor swak seine, tekens, waarskuwingsanalise en sagteware binne vroeë waarskuwingstelsels verbeter. Weick se bydrae verskaf ‘n raamwerk waarbinne hierdie konsepte geanaliseer en ondersoek kan word. Die konsep van swak seine, vroeë-waarskuwing en visuele analise word binne huidige besigheidsuitgangspunte, en die formele intelligensie arena ondersoek. Die mislukking van intelligensie is kenmerkend van gebeure soos 9/11, die onlangse finansiёle krisis wat deur die ondergang van Lehman Brothers ingelei is, en die sogenaamde “Arab Spring”. Hierdie gebeure het ‘n wêreldwye opskudding op ekonomiese en politiese vlak veroorsaak. Moderne metodologieё soos vroeë waarskuwingsanalise, swaksein-analise en omgewingsaanskouing binne regerings- en besigheidsverband het duidelik in hul doelstelling misluk om voortydig te waarsku oor hierdie gebeurtenisse. Dit is juis hierdie mislukkings wat dit noodsaaklik maak om meer aandag te skenk aan hierdie konsepte, asook nuwe tegnologie wat dit kan verbeter. Hoofstuk Een is inleidend en stel die navorsingsvraagstuk, doelwitte en afbakkening. Hoofstuk Twee lê die fondasie van die tesis deur ‘n ondersoek van die hoof konsepte. Hoofstuk Drie verskaf die teoretiese raamwerk, die van Weick se singewingsteorie, waarteen die hoof konsepte in Hoofstuk Twee ondersoek word in Hoofstuk Vier. Klem word gelê op die diepte van integrasie en die toepassing van raamwerke in die analisefase van vroeё waarskuwingstelsels en hoe dit binne die teoretiese beginsels van visuele analise geïnkorporeer word. Die bevindinge van hierdie tesis spreek die feit aan dat Weick se konsepsualisering van singewing konseptuele helderheid rakende die begrip “swakseine” verskaf. In hierdie verband verteenwoordig Weick se “saad”- metafoor die samewerking en uitbouing van seine en “padpredikante” wat die progressiewe aard van swakseine weerspieёl. Die kernbeskouing van hierdie tesis is die belangrikheid van Weick se geloofsgedrewesingewing, veral die uitkoms van die bou van raamwerke asook die bespreking hiervan deur verskeie navorsers. Die belangrikheid van die aksie om seine op te merk, en die effek wat dit op die herbeskouing van raamwerke het, asook die raaksien daarvan in die eerste plek word beklemtoon. Laasgenoemde dui ook aan tot watter mate Weick se singewingsteorie ‘n bydrae maak tot visuele analise veral in ons begrip van die gevolg wat data of inligtingspesifikasie het op die identifisering van seine en onsinnighede in visualisering binne visuele analise-sagteware.
APA, Harvard, Vancouver, ISO, and other styles
8

Moore, Eric. "The weak link in the language teaching system and what to do about it." Thesis, Manhattan, Kan. : Kansas State University, 2009. http://hdl.handle.net/2097/1135.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Durelli, Vinicius Humberto Serapilha. "Toward harnessing a Java high-level language virtual machine for supporting software testing." Universidade de São Paulo, 2013. http://www.teses.usp.br/teses/disponiveis/55/55134/tde-06012014-150025/.

Full text
Abstract:
High-level language virtual machines (HLL VMs) have been playing a key role as a mechanism for implementing programming languages. Languages that run on these execution environments have many advantages over languages that are compiled to native code. These advantages have led HLL VMs to gain broad acceptance in both academy and industry. However, much of the research in this area has been devoted to boosting the performance of these execution environments. Few eorts have attempted to introduce features that automate or facilitate some software engineering activities, including software testing. This research argues that HLL VMs provide a reasonable basis for building an integrated software testing environment. To this end, two software testing features that build on the characteristics of a Java virtual machine (JVM) were devised. The purpose of the rst feature is to automate weak mutation. Augmented with mutation support, the chosen JVM achieved speedups of as much as 95% in comparison to a strong mutation tool. To support the testing of concurrent programs, the second feature is concerned with enabling the deterministic re-execution of Java programs and exploration of new scheduling sequences<br>Máquinas virtuais de linguagens de programação têm desempenhado um papel importante como mecanismo para a implementação de linguagens de programação. Linguagens voltadas para esses ambientes de execução possuem várias vantagens em relação às linguagens compiladas. Essas vantagens fizeram com que tais ambientes de execução se tornassem amplamente utilizados pela indústria e academia. Entretanto, a maioria dos estudos nessa area têm se dedicado a aprimorar o desempenho desses ambientes de execução e poucos têm enfocado o desenvolvimento de funcionalidades que automatizem ou facilitem a condução de atividades de engenharia de software, incluindo atividades de teste de software. Este trabalho apresenta indícios de que máquinas virtuais de linguagens de programação podem apoiar a criação de ambientes de teste de software integrado. Para tal, duas funcionalidades que tiram proveito das características de uma máquina virtual Java foram desenvolvidas. O propósito da primeira funcionalidade e automatizar a condução de atividades de mutação fraca. Após a implementação de tal funcionalidade na máquina virtual Java selecionada, observou-se um desempenho até 95% melhor em relação a uma ferramenta de mutação forte. Afim de apoiar o teste de programas concorrentes, a segunda funcionalidade permite reexecutá-los de forma determinística além de automatizar a exploração de que novas sequências de escalonamento
APA, Harvard, Vancouver, ISO, and other styles
10

Sicramaz, Ayaz Ayse Verfasser], Bernd [Akademischer Betreuer] [Eissfeller, and Wolfgang [Akademischer Betreuer] Gerstacker. "Weak and Degraded Signal Acquisition Techniques in GNSS Software Receiver / Ayse Sicramaz Ayaz. Universität der Bundeswehr München, Fakultät für Luft- und Raumfahrttechnik. Gutachter: Bernd Eissfeller ; Wolfgang Gerstacker. Betreuer: Bernd Eissfeller." Neubiberg : Universitätsbibliothek der Universität der Bundeswehr München, 2014. http://d-nb.info/1054300070/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "WEKA Software"

1

WEGA–SOFTWARE Programmierhandbuch Teil 1/1. VEB Elektro-Apparate-Werke Berlin-Treptow „Friedrich Ebert“, 1987.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

WEGA–SOFTWARE Programmierhandbuch Teil 1/2. VEB Elektro-Apparate-Werke Berlin-Treptow „Friedrich Ebert“, 1987.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

WEGA–SOFTWARE Programmierhandbuch Teil 1/2. VEB Elektro-Apparate-Werke Berlin-Treptow „Friedrich Ebert“, 1987.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Wefa Industrial Monitor 1997 (Valusource Accounting Software Products). John Wiley & Sons Inc, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Wea'17: 5th International Workshop on Software Ecosystem Architectures. Association for Computing Machinery, 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Figueroa-García, Juan Carlos, Alvaro David Orjuela-Cañón, Yesid Díaz-Gutierrez, and Elvis Eduardo Gaona-García. Applied Computer Sciences in Engineering: 8th Workshop on Engineering Applications, WEA 2021, Medellín, Colombia, October 6-8, 2021, Proceedings. Springer International Publishing AG, 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Garay-Rairan, Fabian Steven, German Jairo Hernandez-Perez, Yesid Diaz-Gutierrez, and Juan Carlos Figueroa-García. Applied Computer Sciences in Engineering: 7th Workshop on Engineering Applications, WEA 2020, Bogota, Colombia, October 7-9, 2020, Proceedings. Springer International Publishing AG, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Hernández-Pérez, Germán, Carlos Franco, Juan Carlos Figueroa-García, and Yesid Díaz-Gutierrez. Applied Computer Sciences in Engineering: 9th Workshop on Engineering Applications, WEA 2022, Bogotá, Colombia, November 30-December 2, 2022, Proceedings. Springer, 2022.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Figueroa-García, Juan Carlos, Eduyn Ramiro López-Santana, Roberto Ferro-Escobar, and José Luis Villa-Ramírez. Applied Computer Sciences in Engineering: 4th Workshop on Engineering Applications, WEA 2017, Cartagena, Colombia, September 27-29, 2017, Proceedings ... in Computer and Information Science). Springer, 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Figueroa-García, Juan Carlos, Mario Duarte-González, Sebastián Jaramillo-Isaza, Alvaro David Orjuela-Cañon, and Yesid Díaz-Gutierrez. Applied Computer Sciences in Engineering: 6th Workshop on Engineering Applications, WEA 2019, Santa Marta, Colombia, October 16–18, 2019, Proceedings ... in Computer and Information Science ). Springer, 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "WEKA Software"

1

Hao, Zhengteng. "Application of Open Source Data Mining Software Weka in Marketing Teaching." In Application of Big Data, Blockchain, and Internet of Things for Education Informatization. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-87903-7_44.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Alsolai, Hadeel, and Marc Roper. "Determining the Best Prediction Accuracy of Software Maintainability Models Using Auto-WEKA." In Communications in Computer and Information Science. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-36368-0_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

van Hee, Kees M., Natalia Sidorova, and Jan Martijn van der Werf. "Construction of Asynchronous Communicating Systems: Weak Termination Guaranteed!" In Software Composition. Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-14046-4_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Vaudenay, Serge. "On the weak keys of blowfish." In Fast Software Encryption. Springer Berlin Heidelberg, 1996. http://dx.doi.org/10.1007/3-540-60865-6_39.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Meyer, Roland, and Sebastian Wolff. "Reasoning About Weak Semantics via Strong Semantics." In Principled Software Development. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-98047-8_18.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Englund, Håkan, Martin Hell, and Thomas Johansson. "Correlation Attacks Using a New Class of Weak Feedback Polynomials." In Fast Software Encryption. Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-25937-4_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Procter, Gordon, and Carlos Cid. "On Weak Keys and Forgery Attacks Against Polynomial-Based MAC Schemes." In Fast Software Encryption. Springer Berlin Heidelberg, 2014. http://dx.doi.org/10.1007/978-3-662-43933-3_15.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Colvin, Robert J. "Parallelized Sequential Composition and Hardware Weak Memory Models." In Software Engineering and Formal Methods. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-92124-8_12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Bošnački, Dragan. "A Light-Weight Algorithm for Model Checking with Symmetry Reduction and Weak Fairness." In Model Checking Software. Springer Berlin Heidelberg, 2003. http://dx.doi.org/10.1007/3-540-44829-2_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Kaiser, Claude, and Jean-François Pradat-Peyre. "Weak Fairness Semantic Drawbacks in Java Multithreading." In Reliable Software Technologies – Ada-Europe 2009. Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-01924-1_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "WEKA Software"

1

Xue, Yinjie, Zhiyi Zhang, Chen Liu, Shuxian Chen, and Zhiqiu Huang. "DeepWeak: Weak Mutation Testing for Deep Learning Systems." In 2024 IEEE 24th International Conference on Software Quality, Reliability and Security (QRS). IEEE, 2024. http://dx.doi.org/10.1109/qrs62785.2024.00015.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Zhan, Wang, Liu Tian-yi, and Wu Shuai. "Research on Detection and Tracking Algorithm for Small and Weak Targets on the Sea Surface Based on Neural Networks." In 2025 7th International Conference on Software Engineering and Computer Science (CSECS). IEEE, 2025. https://doi.org/10.1109/csecs64665.2025.11009940.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Cramer, S. D., S. A. Matthes, G. R. Holcomb, B. S. Covino, and S. J. Bullard. "Precipitation Runoff and Atmospheric Corrosion." In CORROSION 2000. NACE International, 2000. https://doi.org/10.5006/c2000-00452.

Full text
Abstract:
Abstract This report presents the results for precipitation runoff studies from boldly exposed zinc surfaces at three sites having substantially different environments: Washington DC, Newport OR, and Albany OR. The relationship between atmospheric corrosion and precipitation runoff chemistries were examined for experiments of up to 33 months duration by the use of geochemical modeling with a software package available from the U.S. Geological Survey. Total precipitation runoff rates for the three sites were determined, as well as contributions from strong acids, weak acids and dry deposition to the total rate. Cumulative zinc runoff losses were linear with respect to both time and precipitation volume, which produce effective models for long-term corrosion mass loss based on runoff loss rates. Precipitation runoff rates for Washington DC, Newport OR, and Albany OR were found to be 0.90, 0.69, and 0.49 :m Zn/y respectively. Contributions to the total precipitation runoff rate from dry deposition (0.26 :m Zn/y), strong acids (0.24 :m Zn/y), and weak acids (0.40 :m Zn/y) reactions were found for the Washington DC site. These values correspond to dry deposition calculations from particle and molecular transport data in the atmosphere. Precipitation runoff rates for Newport OR and Albany OR were found to be due solely to weak acid reactions.
APA, Harvard, Vancouver, ISO, and other styles
4

Robu, R., and V. Stoicu-Tivadar. "Arff convertor tool for WEKA data mining software." In 2010 International Joint Conference on Computational Cybernetics and Technical Informatics. IEEE, 2010. http://dx.doi.org/10.1109/icccyb.2010.5491291.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Fowler, Charles A., and Robert J. Hammel. "Converting PCAPs into Weka mineable data." In 2014 15th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD). IEEE, 2014. http://dx.doi.org/10.1109/snpd.2014.6888681.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Chaouche, Yasmine, Éric Renault, and Ryma Boussaha. "WEKA-based Real-Time Attack Detection for VANET Simulations." In 2023 International Conference on Software, Telecommunications and Computer Networks (SoftCOM). IEEE, 2023. http://dx.doi.org/10.23919/softcom58365.2023.10271621.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Bugarčić, Pavle, Slađana Janković, and Snežana Mladenović. "Forecasting Number of Calls to the Call Center Using Machine Learning." In TRANSPORT FOR TODAY'S SOCIETY. Faculty of Technical Sciences Bitola, 2021. http://dx.doi.org/10.20544/tts2021.1.1.21.p44.

Full text
Abstract:
Abstract – This paper presents a forecast of a number of call arrivals in the call center per hour using supervised machine learning. For the forecast, the WEKA machine learning software tool was used. The results of the forecast are verified using several methods, which shows very good results. Finally, the results of the forecast are presented graphically using Excel diagrams. Keywords – Machine learning, Forecasting, WEKA
APA, Harvard, Vancouver, ISO, and other styles
8

Da Conceição, Julia Luiza, Rosiane De Freitas, Bruno Gadelha, João Gustavo Kienen, Sérgio Anders, and Brendo Cavalcante. "Reconhecendo gêneros musicais brasileiros com técnicas de aprendizagem de máquina supervisionada." In Seminário Integrado de Software e Hardware. Sociedade Brasileira de Computação - SBC, 2020. http://dx.doi.org/10.5753/semish.2020.11328.

Full text
Abstract:
Neste trabalho, é apresentado um estudo sobre o reconhecimento automático dos principais gêneros musicais brasileiros: Axé, Forró, MPB, Rock, Samba e Sertanejo. Para tanto, foram realizados experimentos de classificação automática utilizando a ferramenta Weka e algoritmos clássicos de aprendizagem supervisionada. Foi também realizada uma análise das principais bases de dados disponíveis: GTZAN, FMA, AudioSet, RWC, ISMIR, Magnature e LMD. Como resultado, percebeu-se a escassez de diversidade cultural nestas bases, em sua maioria concentrando estilos globalmente populares como Pop e Rock, reforçando a necessidade de incluir gêneros mais diversos e culturalmente identitários, como os brasileiros.
APA, Harvard, Vancouver, ISO, and other styles
9

Ramos, Caio Cesar Oba, Andre Nunes de Souza, Danilo Sinkiti Gastaldello, and Joao Paulo Papa. "Identification and feature selection of non-technical losses for industrial consumers using the software WEKA." In 2012 10th IEEE/IAS International Conference on Industry Applications - INDUSCON 2012. IEEE, 2012. http://dx.doi.org/10.1109/induscon.2012.6451485.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

AlShaikh, F., and W. Elmedany. "Estimate the performance of applying machine learning algorithms to predict defects in software using weka." In 4th Smart Cities Symposium (SCS 2021). Institution of Engineering and Technology, 2021. http://dx.doi.org/10.1049/icp.2022.0339.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "WEKA Software"

1

Mbani, Benson, Valentin Buck, and Jens Greinert. Megabenthic Fauna Detection with Faster R-CNN (FaunD-Fast) Short description of the research software. GEOMAR, 2023. http://dx.doi.org/10.3289/sw_1_2023.

Full text
Abstract:
This is an A.I. - based workflow for detecting megabenthic fauna from a sequence of underwater optical images. The workflow (semi) automatically generates weak annotations through the analysis of superpixels, and uses these (refined and semantically labeled) annotations to train a Faster R-CNN model. Currently, the workflow has been tested with images of the Clarion-Clipperton Zone in the Pacific Ocean
APA, Harvard, Vancouver, ISO, and other styles
2

Gallego, Juan Miguel, and Luis H. Gutiérrez. ICTs in Latin American and the Caribbean Firms: Stylized Facts, Programs and Policies: Knowledge Sharing Forum on Development Experiences: Comparative Experiences of Korea and Latin America and the Ca. Inter-American Development Bank, 2015. http://dx.doi.org/10.18235/0007003.

Full text
Abstract:
Adoption of information and communication technologies (ICTs) has been slow in Latin American and the Caribbean (LAC) countries and is not widespread. There is a digital divide between and within countries, including a digital gap in firms' adoption of ICTs. Large and medium-sized enterprises generally have access to the Internet, but adoption of advanced ICTs is low for all firms in these economies, and small and micro enterprises lag way behind. The backwardness in ICT adoption is exacerbated when only a small fraction of society has high connectivity broadband. Thus the digital infrastructure remains weak despite regional governments' promotion of a digital agenda. Bolder programs are needed. The success of public initiatives requires a competitive environment for internet and telecom service providers as well strong participation of the private sector and public-private partnerships. In particular, the engagement of large firms is necessary to increase ICTs diffusion in small and medium-sized enterprises (SMEs) that are part of their production chains. Additionally, coordination among different government agencies is critical for improving ICT policies design and implementation. The relevance of well-designed ICT policies is apparent in empirical and qualitative evidence from Chile, Colombia and Uruguay, where ICT investment indicates a positive impact on firm innovation and productivity. As part of what some call the digital ecosystem, the IT industry plays an important role, but we observe large heterogeneity in the LAC region. Brazil and Mexico are two big players with relatively well-developed software and hardware industries oriented to the domestic market, while Costa Rica and Uruguay emerge as IT producers and exporters. In between, medium-sized countries like Argentina, Colombia, Peru and Ecuador are looking for a position in either their internal or external markets. To increase performance in the IT industry and complement the existing ecosystem, ICT policies must be accompanied by industrial programs that go beyond the usual horizontal industrial policies.
APA, Harvard, Vancouver, ISO, and other styles
3

Butterweck, Gernot, Alberto Stabilini, Benno Bucher, et al. Aeroradiometric measurements in the framework of the swiss exercise ARM23. Paul Scherrer Institute, PSI, 2024. http://dx.doi.org/10.55402/psi:60054.

Full text
Abstract:
The flights of the civil (ARM23c) and military (ARM23m) parts of the exercise were performedbetween June 19th and 23rd and between September 11th and September 15th,respectively. The measuring system RLL001 was employed for all measurements. As usual, during the civil exercise the environs of some of the Swiss nuclear power plants were screened, on behalf of the Swiss Nuclear Safety Inspectorate (ENSI). At the site of the nuclear power plant Gösgen (KKG) with its pressurized water reactor, the activation products of the primary coolant loop are kept in the well shielded reactor building, thus generating no elevated readings neither on the premises nor in the vicinity of the power plant. The nuclear power plant of Mühleberg (KKM) is now being decommissioned. During this phase, activated components are temporarily stored and processed on the plant premises. The dose rate produced by these components, easily detected and identified with the Swiss airborne gamma spectrometry system, is nevertheless very modest and closely monitored by the Swiss Nuclear Safety Inspectorate (ENSI). Search exercises for radionuclide sources were performed in both parts of ARM23. The operational software of the RLL systems was able to detect the radionuclide sources placed in military training areas. The Man-Made Gross-Count (MMGC) ratio demonstrated a good sensitivity for the identification of radionuclide sources. Nevertheless, a weak radionuclide source placed in the field of view of the helicopter (300 m x 300 m at a ground clearance of 100 m) together with a much stronger radionuclide source emitting higher energy photons was obscured due to Compton scattered photons and therefore could not be detected. Measurements of two teams using drones equipped with radiation monitors demonstrated that low flying drones (ground clearance below 10 m) can be a valuable and complementary tool to identify sources and to further reduce the target area to be searched with ground teams. An altitude profile over Lake Constance confirmed the already observed influence of airborne radon progeny on the determination of cosmic and background corrections. Background flights were performed over several Swiss regions. Besides attenuation effects of water bodies, variations of natural radionuclide content could be observed. A new flight strategy in alpine topography was tested near the Swiss mountain Chrüz. Following contour lines of the topography reduces the necessity for drastic flight altitude changes compared to the parallel line pattern normally used, but is much more challenging for the pilots.
APA, Harvard, Vancouver, ISO, and other styles
4

Lehotay, Steven J., and Aviv Amirav. Fast, practical, and effective approach for the analysis of hazardous chemicals in the food supply. United States Department of Agriculture, 2007. http://dx.doi.org/10.32747/2007.7695587.bard.

Full text
Abstract:
Background to the topic: For food safety and security reasons, hundreds of pesticides, veterinary drugs, and environmental pollutants should be monitored in the food supply, but current methods are too time-consuming, laborious, and expensive. As a result, only a tiny fraction of the food is tested for a limited number of contaminants. Original proposal objectives: Our main original goal was to develop fast, practical, and effective new approaches for the analysis of hazardous chemicals in the food supply. We proposed to extend the QuEChERS approach to more pesticides, veterinary drugs and pollutants, further develop GC-MS and LC-MS with SMB and combine QuEChERS with GC-SMB-MS and LC-SMB-EI-MS to provide the “ultimate” approach for the analysis of hazardous chemicals in food. Major conclusions, solutions and achievements: The original QuEChERS method was validated for more than 200 pesticide residues in a variety of food crops. For the few basic pesticides for which the method gave lower recoveries, an extensive solvent suitability study was conducted, and a buffering modification was made to improve results for difficult analytes. Furthermore, evaluation of the QuEChERS approach for fatty matrices, including olives and its oil, was performed. The QuEChERS concept was also extended to acrylamide analysis in foods. Other advanced techniques to improve speed, ease, and effectiveness of chemical residue analysis were also successfully developed and/or evaluated, which include: a simple and inexpensive solvent-in-silicone-tube extraction approach for highly sensitive detection of nonpolar pesticides in GC; ruggedness testing of low-pressure GC-MS for 3-fold faster separations; optimization and extensive evaluation of analyte protectants in GC-MS; and use of prototypical commercial automated direct sample introduction devices for GC-MS. GC-MS with SMB was further developed and combined with the Varian 1200 GCMS/ MS system, resulting in a new type of GC-MS with advanced capabilities. Careful attention was given to the subject of GC-MS sensitivity and its LOD for difficult to analyze samples such as thermally labile pesticides or those with weak or no molecular ions, and record low LOD were demonstrated and discussed. The new approach of electron ionization LC-MS with SMB was developed, its key components of sample vaporization nozzle and flythrough ion source were improved and was evaluated with a range of samples, including carbamate pesticides. A new method and software based on IAA were developed and tested on a range of pesticides in agricultural matrices. This IAA method and software in combination with GC-MS and SMB provide extremely high confidence in sample identification. A new type of comprehensive GCxGC (based on flow modulation) was uniquely combined with GC-MS with SMB, and we demonstrated improved pesticide separation and identification in complex agricultural matrices using this novel approach. An improved device for aroma sample collection and introduction (SnifProbe) was further developed and favorably compared with SPME for coffee aroma sampling. Implications, both scientific and agricultural: We succeeded in achieving significant improvements in the analysis of hazardous chemicals in the food supply, from easy sample preparation approaches, through sample analysis by advanced new types of GC-MS and LCMS techniques, all the way to improved data analysis by lowering LOD and providing greater confidence in chemical identification. As a result, the combination of the QuEChERS approach, new and superior instrumentation, and the novel monitoring methods that were developed will enable vastly reduced time and cost of analysis, increased analytical scope, and a higher monitoring rate. This provides better enforcement, an added impetus for farmers to use good agricultural practices, improved food safety and security, increased trade, and greater consumer confidence in the food supply.
APA, Harvard, Vancouver, ISO, and other styles
5

Baumgartner, Franz, Cyril Allenspach, Ebrar Özkalay, et al. Performance of Partially Shaded PV Generators Operated by Optimized Power Electronics 2024. Edited by Ulrike Jahn. International Energy Agency Photovoltaic Power Systems Programme, 2024. https://doi.org/10.69766/leof5152.

Full text
Abstract:
Inhomogeneous shading on the PV generator leads to disproportionately high losses. As the potential of PV generation on roofs or façades is to be increasingly utilised in the coming decades, these cases will occur more frequently. The aim here is to provide an overview of the challenges and state-of-the-art technical solutions for partial shading. Current developments in PV engineering show that maximum performance lies in the combination between optimised module placement, the use of modules that are tolerant of shading and optimised power electronics. Shortly after the discovery of the solar cell, blocking or bypass diodes were used to solve the inhomogeneous currents of groups of solar cells arranged in series or parallel wiring. Even today, they are still the most efficient and robust solution for the majority of common shading PV applications. Due to the very high rated outputs of the solar modules and the presence of only three bypass diodes, high temperatures can occur on a locally shaded solar cell. This forces heat outputs of up to 200W or 100W in the butterfly module connection through the associated activated bypass diode, which must be dissipated by the most shaded cell. If additional small-area defects occur in this affected solar cell, hotspot peak temperatures can occur, which can lead to permanent damage to the module or the risk of fire. However, in order to prevent a third of the module output being lost in this case, four or more bypass diodes are now used in so-called shadow-tolerant PV modules. With a higher number of bypass diodes per module area, it is also possible to selectively bypass smaller, less efficient areas of the module, which leads to an increase in the module yield. The hotspot effects can also be comprehensively and robustly prevented by the small number of solar cells per bypass diode, provided the bypass diode is properly designed. The first manufacturers are beginning to place these shade-tolerant PV modules on the markets. Today, planners can also select different power electronics systems for the next step in system integration towards grid feed-in, i.e. the connection of the individual modules in the string. This is the classic series connection of all modules in the string to the input of the DC/AC string inverter (SINV), which leads to the highest yields for weak and medium shading. This applies, for example, to light shading with a chimney or a ventilation pipe, where no more than one tenth of the modules in the string are reached by the shade at the same time during the six hours around midday, even when using standard modules with only three bypass diodes. (see Table 1) With medium to heavy shading, the widely used DC/DC converters directly on the PV module (MLPE), often also called power optimisers, can be used profitably. However, the combination of shade-tolerant PV modules with conventional SINVs can often deliver comparable annual yields. However, if the optimisers are also used behind each module even with weak shading (allMLPE), they deliver less yield in total than the simple SINV, as their own DC/DC losses then have a negative impact compared to simple connectors. This only becomes apparent if the MLPE manufacturers' data sheet claims of 99% efficiency are not viable. The published measurements carried out in independent laboratories over the last four years are listed in this report, which suggest that losses are around 2% higher. As the differences in yield between the power electronics variants SINV and MLPE are usually less than four per cent in annual yield for light to medium shading, the above-mentioned real MLPE efficiency at the specific operating points plays the decisive role in planning the most efficient system. However, as the commercial PV software planning tools currently use these MLPE manufacturer specifications which are over estimated, no meaningful system comparison can be expected for these shading categories. In this report the results of annual simulations performed by some sophisticated simulation tools that take these real MLPE losses into account are discussed.
APA, Harvard, Vancouver, ISO, and other styles
6

CONFORMATION AND STATIC PERFORMANCE ANALYSIS OF PENTAGONAL THREE-FOUR STRUT HYBRID OPEN-TYPE CABLE DOME. The Hong Kong Institute of Steel Construction, 2023. http://dx.doi.org/10.18057/ijasc.2023.19.4.9.

Full text
Abstract:
Traditional cable domes exhibit many defects, such as irregular grids and weak circumferential stiffness. This paper proposes a new cable dome and elaborates on the topological form of the new cable dome. Furthermore, the pre-stress state of the structure is deduced by establishing the nodal equilibrium equations. In addition, load states analysis and parametric analysis were conducted using finite element simulations in ANSYS software. The results show that the pre-stress distribution of this structure is reasonable because of the regular grids. Compared to traditional cable domes, the new design shows superior static performance and enhanced circumferential stiffness. As a result, the cables hardly slack under different load conditions. Moreover, it can improve structural stiffness by appropriately adjusting the initial pre-stress, rise-span and thickness-span ratios. Finally, recommended ranges of the above parameters are provided, offering valuable engineering design guidance.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!