Search Results - (( basic selection drops algorithm ) OR ( java implementation tree algorithm ))

  • Showing 1 - 6 results of 6
Refine Results
  1. 1

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde by Ogunfolajin Maruff , Tunde

    Published 2022
    “…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization by Mohammad Ata, Karimeh Ibrahim

    Published 2019
    “…This study proposes a car parking management system which applies Dijkstra’s algorithm, Ant Colony Optimization (ACO) and Binary Search Tree (BST) in structuring a guidance system for indoor parking. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Performance enhancement of adaptive cluster formation and routing protocols in wireless networks by Khalaf, Osamah Ibrahem

    Published 2017
    “…The IVRP, EBCRA and ESRSBRP performance have been compared with the other routing algorithms. The efficiency and scalability of the proposed algorithms are measured based on different performance metrics, namely: throughput, packet delivery ratio, end to end delay, the number of dropped packets and normalized control overhead. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    High Viscous Fluid Transport Model by Tan, Ming Chai

    Published 2004
    “…The Dulang D 8-L crude oil was selected as the high viscous fluid due to its viscous characteristic. …”
    Get full text
    Get full text
    Final Year Project
  6. 6

    Machine Learning Based Two Phase Detection and Mitigation Authentication Scheme for Denial-of-Service Attacks in Software Defined Networks by Najmun, Najmun

    Published 2024
    “…Computer networks are becoming increasingly important to the delivery of modern society's basic services. As a result of this growing dependence, traffic and users worldwide have also grown. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis