Search Results - (( basic generation x algorithm ) OR ( java implementation tree algorithm ))
Search alternatives:
- java implementation »
- implementation tree »
- basic generation »
- tree algorithm »
- generation x »
- x algorithm »
-
1
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
Get full text
Get full text
Get full text
Article -
2
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
Get full text
Get full text
Get full text
Thesis -
3
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…This study proposes a car parking management system which applies Dijkstra’s algorithm, Ant Colony Optimization (ACO) and Binary Search Tree (BST) in structuring a guidance system for indoor parking. …”
Get full text
Get full text
Thesis -
4
-
5
AnkPlex: algorithmic structure for refinement of near-native ankyrin-protein docking
Published 2017“…A dataset of APKs was generated from seven X-ray APKs, which consisted of 3 internal domains, using the reliable docking tool ZDOCK. …”
Get full text
Get full text
Article -
6
-
7
-
8
-
9
-
10
Penggunaan penggugusan subtraktif bagi menjana peraturan kabur
Published 2005“…Based on the study, it is found that the system was able to generate 8 cluster center at on 30(3x10) data value at 0.3 cluster radius and also able to generate 4 cluster center at 0.5 radius with average MSE of 0.005…”
Get full text
Get full text
Article -
11
Integration of enchanced jump point search (JPS) algorithm with modified bresenham technique for path planning in virtual grid-based environment
Published 2018“…The second approach is the modification of heuristic computation using original A* and modified Bresenham. Bresenham Line Algorithm is a line generation algorithm using integer arithmetic where the points (x1, y1) and (x2, y2) are assumed not equal and integer valued. …”
Get full text
Get full text
Get full text
Thesis -
12
-
13
-
14
Determination of power flow and loss allocation using superposition theory method
Published 2011Get full text
Article -
15
-
16
Penggunaan penggugusan subtraktif bagi menjana peraturan kabur
Published 2005“…Based on this study, it is found that the system was able to generate 8 cluster center on 30 (3 x 10) data value at 0.3 cluster radius and also able to generate 4 cluster center at 0.5 radit.rs with average MSE of 0.005). …”
Get full text
Get full text
Get full text
Article -
17
Transcriptomic Study of Gracilaria Changii (Gracilariales, Rhodophyta) By Expressed Sequence Tags and Cdna Microarray Approach
Published 2009“…The putative identity of TUGs was identified by using Basic Local Alignment Search Tool X (BLASTX) algorithm and classified according to the functional groups in Kyoto Encyclopedia of Genes and Genomes (KEGG). …”
Get full text
Get full text
Thesis -
18
Solving power system state estimation using orthogonal decomposition algorithm / Tey Siew Kian
Published 2009“…This optimal state estimate and corrected data base are then used by the security monitoring and operation and control functions of the center.Most state estimation programs in practical use are formulated as overdetermined systems (Pozrikidis, 2008) of nonlinear equations and solved as weighted least square problems (refer to section 2.1.1).This research involves finding the least squares solution of the power system state estimation problem, HTR-1HDx = HTR-1 [z - f (x)] (refer to section 2.3.1) and to develop a program to implement the said algorithm. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis -
19
Incremental learning for large-scale stream data and its application to cybersecurity
Published 2015“…The online business of Company X is running normally as usual, until a day before mother’s day, the webpage of Company X is totally down and the prospective customers could not open the webpage to make order to be sent specially for their beloved mother. …”
Get full text
Get full text
Thesis
