Search Results - (( basic implementation some algorithm ) OR ( java implementation tree algorithm ))

Refine Results
  1. 1

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Implementation of an autonomous mobile robot navigation algorithm using C language by Subra Mullisi, Shafeq Marwan

    Published 2009
    “…This report basically discusses the study and also work that has been done from previous of the chosen topic, which is Implementation of an Autonomous Mobile Robot Navigation Algorithm using 'C' language. …”
    Get full text
    Get full text
    Final Year Project
  3. 3

    Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde by Ogunfolajin Maruff , Tunde

    Published 2022
    “…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5

    Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization by Mohammad Ata, Karimeh Ibrahim

    Published 2019
    “…This study proposes a car parking management system which applies Dijkstra’s algorithm, Ant Colony Optimization (ACO) and Binary Search Tree (BST) in structuring a guidance system for indoor parking. …”
    Get full text
    Get full text
    Thesis
  6. 6

    SEGMENTATION OF ANTI-NUCLEAR ANTIBODY IMAGES BASED ON WATERSHEDS AND FAST REGION MERGING by Mehfar, Noor Liyana

    Published 2013
    “…Moreover, in this paper, basic Gaussian filter is been implement to enhance the watershed segmentation by reducing some of the unwanted noise inside the images and highlighting the edge of cells. …”
    Get full text
    Get full text
    Final Year Project
  7. 7

    Dynamic Feedback Flow Control Algorithms for Unicast and Multicast Available Bit Rate Service in Asynchronous Transfer Mode Networks by Abdelrahman, Ali Mohamed

    Published 2000
    “…Some of these algorithms do not measure the actual ABR traffic load which leads to either overestimates or underestimates of the bandwidth allocation. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Computing the autopilot control algorithm using predictive functional control for unstable model by H. A., Kasdirin, J. A., Rossiter

    Published 2009
    “…One basic Ballistic Missile model (10) is used as an unstable model to formulate the control law algorithm using PFC. …”
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    A hybrid algorithm based on artificial bee colony and artificial rabbits optimization for solving economic dispatch problem by Lee, Wei Wen, Hashim, Mohd Ruzaini

    Published 2023
    “…Despite these advantages, the basic ABC algorithm has some drawbacks such as slow convergence, poor exploitation, and difficulty in finding the best solution among all feasible solutions in some cases. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    Optimization of Motion Compensated Block-Based DCT Video Compression for Software Implementation by Chen, Soong Der

    Published 2000
    “…This thesis focuses on ways to improve the existing solutions in the algorithmic and implementation aspects. For the algorithmic aspect, the basic principles of motion compensated DCT block-based compression scheme was studied. …”
    Get full text
    Get full text
    Thesis
  11. 11

    JPEG Image Encryption Using Combined Reversed And Normal Direction-Distorted Dc Permutation With Key Scheduling Algorithm-Based Permutation by Abu, Ahmad Zaidee

    Published 2008
    “…It terms of security, with the combination of Distorted DC permutation (DDP), it was considered to be having medium security based on some basic attack analysis that was carried out. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Studies on flat CORDIC implementation in field programmable gate arrays (FPGA) / Meera Subramaniam by Meera , Subramaniam

    Published 2004
    “…The CORDIC algorithm has been widely researched as an efficient hardware algorithm for the computation of trigonometric, hyperbolic and transcendental functions. …”
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14

    The design and applications of the african buffalo algorithm for general optimization problems by Odili, Julius Beneoluchi

    Published 2017
    “…Some of the successfully designed stochastic algorithms include Simulated Annealing, Genetic Algorithm, Ant Colony Optimization, Particle Swarm Optimization, Bee Colony Optimization, Artificial Bee Colony Optimization, Firefly Optimization etc. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Cars detection in stitched image using morphological approach by Joselyn, Jok.

    Published 2017
    “…At the end of the project, some future recommendation for the system’s development will be presented.…”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  16. 16
  17. 17
  18. 18

    The Improvement of the Image by Using MATLAB by Hariza, Haimi

    Published 2006
    “…Noise reduction is a technique to recover an original image from a degraded one. Basically, this project is focusing on impulsive noise reduction using a nonlinear Spatial filtering whereby an algorithm will be implemented to solve problem faced with standard Median Filter. …”
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  19. 19

    Automatic generic process migration system in linux by Zarrabi, Amirreza

    Published 2012
    “…A fexible interface to the underlying checkpoint/ restart subsystem is designed which permits users to specify the migration mechanism according to process constraints. A migration algorithm is designed which attempts to exploit the unique features of the basic migration algorithms to form a generic algorithm. …”
    Get full text
    Get full text
    Thesis
  20. 20