Search Results - (( basic integration among algorithm ) OR ( java implementation tree algorithm ))
Search alternatives:
- java implementation »
- implementation tree »
- basic integration »
- integration among »
- among algorithm »
- tree algorithm »
-
1
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
Get full text
Get full text
Get full text
Article -
2
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
Get full text
Get full text
Get full text
Thesis -
3
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…This study proposes a car parking management system which applies Dijkstra’s algorithm, Ant Colony Optimization (ACO) and Binary Search Tree (BST) in structuring a guidance system for indoor parking. …”
Get full text
Get full text
Thesis -
4
A hybrid algorithm based on artificial bee colony and artificial rabbits optimization for solving economic dispatch problem
Published 2023“…Despite these advantages, the basic ABC algorithm has some drawbacks such as slow convergence, poor exploitation, and difficulty in finding the best solution among all feasible solutions in some cases. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
Dynamic Feedback Flow Control Algorithms for Unicast and Multicast Available Bit Rate Service in Asynchronous Transfer Mode Networks
Published 2000“…The simulation results show that the DRFC algorithm allocates the available bandwidth fairly among the contending ABR sources, while achieving high link utilisation with reasonable growth of queues. …”
Get full text
Get full text
Thesis -
6
Optimization of supply chain management by simulation based RFID with XBEE Network
Published 2015“…In order to solve this problem, a simulation based “Multi-Colony Global Particle Swarm Optimization (MC-GPSO)” algorithm was developed. This algorithm computes the optimal results of objective functions in a scientific manner. …”
Get full text
Get full text
Get full text
Thesis -
7
Real time monitoring and controlling using Petri net algorithm for batch process plant / Mohamad Shaiful Osman
Published 2010“…This thesis searches the basic concepts and uses of the classical method Petri net algorithm in SCADA system to control and monitoring the process plant. …”
Get full text
Get full text
Thesis -
8
An enhanced swap sequence-based particle swarm optimization algorithm to solve TSP
Published 2021“…Several variants of PSO have been proposed for solving discrete optimization problems like TSP. Among them, the basic algorithm is the Swap Sequence based PSO (SSPSO), however, it does not perform well in providing high quality solutions. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
9
African Buffalo Optimization Algorithm for Tuning Parameters of a PID Controller in Automatic Voltage Regulators
Published 2016“…The highpoints of the ABO include its use of few parameters, constant interactions among the buffalos and the deployment of the exploration and exploitations mechanisms of the algorithm in every iteration. …”
Get full text
Get full text
Get full text
Article -
10
Development of cell formation algorithm and model for cellular manufacturing system
Published 2011“…The performance of the proposed algorithm is compared with a number of key algorithms that reported in the corresponding scientific literature. …”
Get full text
Get full text
Thesis -
11
A novel spiral backoff mechanism for wireless sensor networks MAC protocol in smart grid system
Published 2015“…Carrier Sense Multiple Access-Collision Avoidance (CSMA-CA) with binary exponential backoff (BEB) algorithm is used as a technique to share the common wireless medium and avoids collision among the contending sensor nodes. …”
Get full text
Get full text
Get full text
Proceeding Paper -
12
Bridging Mayer’s cognitive theory of multimedia learning and computational thinking in tackling the cognitive load issues among young digital natives : a conceptual framework
Published 2022“…This research focuses on CT concepts that will be integrated with Mayer’s CTML in designing the learning material for young digital natives. …”
Get full text
Get full text
Get full text
Article -
13
A hybrid prediction model for pipeline corrosion using Artificial Neural Network with Particle Swarm Optimization
Published 2018“…This project aims to develop a hybrid prediction Model which can target specific corrosion damage mechanisms. The basic ANN Model will be improved by integrating the Particle Swarm Optimization (PSO) algorithm to achieve a better and optimal performance. …”
Get full text
Get full text
Article -
14
A hybrid prediction model for pipeline corrosion using Artificial Neural Network with Particle Swarm Optimization
Published 2018“…This project aims to develop a hybrid prediction Model which can target specific corrosion damage mechanisms. The basic ANN Model will be improved by integrating the Particle Swarm Optimization (PSO) algorithm to achieve a better and optimal performance. …”
Get full text
Get full text
Article -
15
-
16
What stole Chinese older adults’ life satisfaction? Integrating medical statistics and machine learning with a life-course perspective using CHARLS data
Published 2026“…Conclusion: This study provides an integrated and stage-specific understanding of life satisfaction among older Chinese adults. …”
Get full text
Get full text
Get full text
Article -
17
African Buffalo Optimization Strategy for Tuning Parameters of a PID Controller in Automatic Voltage Regulators
Published 2016“…The highpoints of the ABO include its use of few parameters, constant interactions among the buffalos and the deployment of the exploration and exploitations mechanisms of the algorithm in every iteration. …”
Get full text
Get full text
Get full text
Get full text
Article -
18
A Machine Learning Classification Approach to Detect TLS-based Malware using Entropy-based Flow Set Features
Published 2022“…Furthermore, using the basic features, TLSMalDetect achieved the highest accuracy of 93.69% by Naïve Bayes (NB) among the ML algorithms applied. …”
Get full text
Get full text
Get full text
Get full text
Article -
19
One-dimension high-order compact method for solving euler's equation
Published 2010“…Among those most famous and relevant are based on flux vector splitting and Godunov-type schemes. …”
Get full text
Get full text
Thesis -
20
Improving modified cocomo ii artificial neural network using hyperbolic tangent activation function
Published 2017“…Back-propagation learning algorithm is applied to the multilayer neural network for training and testing. …”
Get full text
Get full text
Get full text
Get full text
Thesis
