Search Results - (( affecting implementation some algorithm ) OR ( java application tree algorithm ))
Search alternatives:
- affecting implementation »
- implementation some »
- java application »
- application tree »
- some algorithm »
- tree algorithm »
-
1
-
2
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
Get full text
Get full text
Get full text
Article -
3
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
4
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…This thesis is based on the application of sentiment classification algorithm to tweet data with the goal of classifying messages based on the polarity of sentiment towards a particular topic (or subject matter). …”
Get full text
Get full text
Get full text
Thesis -
5
VITILIGO LESION ASSESSMENT TOOL ON SMARTPHONE
Published 2013“…In some European countries skin diseases affect around 60 percent of the population [15]. …”
Get full text
Get full text
Final Year Project -
6
Attribute related methods for improvement of ID3 Algorithm in classification of data: A review
Published 2020“…Nevertheless, there are some limitations in ID3 algorithm that can affect the performance in the classification of data. …”
Get full text
Get full text
Get full text
Article -
7
Outdoor marker-less tracking and pose calculating system for mobile augmented reality
Published 2014“…While some adopt client server architecture for marker-less tracking which is adversely affected by network latency. …”
Get full text
Get full text
Thesis -
8
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…In this paper, we propose an improvement of pattern growth-based PrefixSpan algorithm, called I-PrefixSpan. The general idea of I-PrefixSpan is to use the efficient data structure for general tree-like framework and separator database to reduce the execution time and memory usage. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
9
Amplitude independent muscle activity detection algorithm of soft robotic glove system for hemiparesis stroke patients using single sEMG channel
Published 2020“…To simplify soft robotic glove systems and make them more practical for use in daily basis, they should have minimum number of sEMG channels. In spite of some algorithms that have been developed in the literature to classify some hand motions by using single channel, the current implementation of soft robotic glove systems are still employing two channels for detecting the closing and opening movements of the hand, due to the intensive calculations required by these algorithms which impose difficulties on real time implementation. …”
Get full text
Get full text
Thesis -
10
Token based path allocation approach for mobile robots in sorting centre for achieving high throughput
Published 2024“…This project proposes an improved path-finding algorithm that implements token-based path finding while a robot wants to access a grid cell. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
11
AI powered asthma prediction towards treatment formulation: an android app approach
Published 2022“…We utilized eight robust machine learning algorithms to analyze this dataset. We found that the Decision tree classifier had the best performance, out of the eight algorithms, with an accuracy of 87%. …”
Get full text
Get full text
Get full text
Article -
12
Development of heuristic task scheduling algorithm in cloud computing
Published 2016“…The proposed algorithm is followed by a discussion in order to make smoother the implementation. …”
Get full text
Get full text
Proceeding Paper -
13
Architectural review of load balancing single system image
Published 2008“…Result: This study will review some of the most popular architecture and algorithms used in load balancing single system image. …”
Get full text
Get full text
Article -
14
A semi-synchronous label propagation algorithm with constraints for community detection in complex networks
Published 2017“…Despite this advantage in computational time, the performance of LPA is affected by randomness in the algorithm. A modified LPA, called CLPA-GNR, was proposed recently and it succeeded in handling the randomness issues in the LPA. …”
Get full text
Get full text
Article -
15
Traffic management algorithms for LEO satellite networks
Published 2016“…Those two algorithms are combined together due to the strong possibilities of being unable to achieve the optimal results when implemented separately. …”
Get full text
Get full text
Get full text
Thesis -
16
AI powered asthma prediction towards treatment formulation : An android app approach
Published 2022“…We utilized eight robust machine learning algorithms to analyze this dataset. We found that the Decision tree classifier had the best performance, out of the eight algorithms, with an accuracy of 87%. …”
Get full text
Get full text
Get full text
Article -
17
Improved flower pollination optimization algorithm based on swap operator and dynamic switch probability selection
Published 2023“…These algorithms belong to stochastic and nondeterministic classes, have some problems with exploration or exploitation. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
18
The effect of job satisfaction on the relationship between organizational culture and organizational performance
Published 2023“…These algorithms belong to stochastic and nondeterministic classes, have some problems with exploration or exploitation. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
19
A secure, anonymous and verifiable E-Voting system
Published 2020“…Furthermore, this paper also proposes a more secure voting system which uses some encryption and hashing algorithms in order to solve the negative impacts of the existing voting systems. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
20
Dynamic key scheduling algorithm for block ciphers using quasigroup string transformation
Published 2018“…Similarly, the key space should be disproportionately large to resist any attack on the secret key. To archive that, some algorithms adopt the use of matrixes such as quasigroup, Hybrid cubes and substitution box (S-box) to generate the encryption keys. …”
Get full text
Get full text
Get full text
Get full text
Thesis
