Search Results - (( affecting implementation tree algorithm ) OR ( java location based algorithm ))
Search alternatives:
- affecting implementation »
- implementation tree »
- tree algorithm »
- java »
-
1
Attribute related methods for improvement of ID3 Algorithm in classification of data: A review
Published 2020“…There are several learning algorithms to implement the decision tree but the most commonly-used is ID3 algorithm. …”
Get full text
Get full text
Get full text
Article -
2
-
3
Group formation using genetic algorithm
Published 2009“…However, due to lack of programming skills especially in Java programming language and the inability to have meetings frequently among the group members,most of the students’ software project cannot be delivered successfully.To solve this problem, systematic group formation is one of the initial factors that should be considered to ensure that every group consists of quality individuals who are good in Java programming and also to ensure that every group member in a group are staying closer to each other.In this research, we propose a method for group formation using Genetic Algorithms, where the members for each group will be generated based on the students’ programming skill and location of residential colleges.…”
Get full text
Get full text
Get full text
Get full text
Monograph -
4
Nano-scale VLSI clock routing module based on useful-skew tree algorithm
Published 2006“…Thus, we propose a clock routing synthesis module that applies non-zero skew (or called useful-skew) method to reduce the system-wide minimum clock period to improve the performance of synchronous digital circuit. We implemented Useful-Skew Tree (UST) algorithm which is based on the deferred-merge embedding (DME) paradigm, as the clock layout synthesis engine. …”
Get full text
Get full text
Article -
5
Multi-floor indoor location estimation system based on wireless local area network
Published 2007“…The most probable match is selected and returned as estimated location based on Bayesian filtering algorithm. Estimated location is reported as physical location and symbolic location. …”
Get full text
Get full text
Thesis -
6
-
7
Footwear quality evaluation using decision tree and logistic regression models
Published 2022“…The objectives of the study are to determine the rank factors that affect the quality of footwear using decision tree methods. …”
Get full text
Get full text
Thesis -
8
Hardware development of autonomous mobile robot based on actuating lidar
Published 2022“…From here, the extracted values are implied on k-NN, Decision Tree and CNN training algorithm. The final result shows promising potential with 91% prediction when implemented on the Decision Tree algorithm based on our proposed system of a single actuating LiDAR sensor.…”
Get full text
Get full text
Get full text
Article -
9
The effectiveness of bottom up technique with probabilistic approach for a Malay parser
Published 2018“…The bottom up parsing will be supported by implementing Cocke–Younger–Kasami (CYK) algorithm. The parser’s performance is evaluated based on its effectiveness to overcome ambiguity by suggesting a more precise parse tree. …”
Get full text
Get full text
Get full text
Article -
10
Detection of mature and immature oil palm from image Sentinel-2 using Google Earth Engine (GEE) / Nurul Ain Nabilah Sharuddin
Published 2022“…Four (4) machine learning algorithms are used in classification, such as Random Forest (RF), smile Classification and Regression Tree (smileCART), Gradient Tree Boost (GTB), and Minimum Distance (MD). …”
Get full text
Get full text
Thesis -
11
Mathematical simulation for 3-dimensional temperature visualization on open source-based grid computing platform
Published 2009“…The development of this architecture is based on several programming language as it involves algorithm implementation on C, parallelization using Parallel Virtual Machine (PVM) and Java for web services development. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
12
Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption
Published 2022“…Subsequently, this project embedded with a lightweight Geo-Encryption algorithm to preserve the privacy of real-time GPS location. …”
Get full text
Get full text
Get full text
Academic Exercise -
13
Cyberbullying detection: a machine learning approach
Published 2022“…The machine learning algorithm, Support Vector Machine was chosen after comparing it with other algorithms such as Multinomial Naïve Bayes, Decision Tree Classifier, and Random Forest Classifier. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
14
Poverty risk prediction based on socioeconomic factors using machine learning approach
Published 2025“…Information gain was used in the feature selection and four classification algorithms namely, Logistic Regression, Random Forest, Decision Tree, and Gradient Boosted, were implemented and tested with the incorporation of 10-fold cross-validation and splitting 70:30 in WEKA. …”
Get full text
Get full text
Student Project -
15
Polymorphic malware detection based on dynamic analysis and supervised machine learning / Nur Syuhada Selamat
Published 2021“…The benefit of this work indicated that the implementation of a feature selection technique plays an important role in machine learning algorithms to increase the performance of detection.…”
Get full text
Get full text
Thesis -
16
Prediction models of heritage building based on machine learning / Nur Shahirah Ja'afar
Published 2021“…To overcome these limitations, this research has proposed five machine learning algorithms namely Linear Regression, Lasso, Ridge, Random Forest and Decision Tree. …”
Get full text
Get full text
Thesis -
17
An improved diabetes risk prediction framework : An Indonesian case study
Published 2018“…In conclusion,DRPF is implementable as prototype and has been highly accepted by Indonesian practitioners as aid for the diagnostics of diabetes.…”
Get full text
Get full text
Get full text
Thesis -
18
Friendship Degree and Tenth Man Strategy: A new method for differentiating between erroneous readings and true events in wireless sensor networks
Published 2023“…The second stage will validate the voting process through a novel perspective based on the TMS. TMS will check the voters’ replies based on the event’s location. …”
Get full text
Get full text
Article -
19
-
20
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis
