Search Results - (( basic selection machine algorithm ) OR ( java implementation tree algorithm ))
Search alternatives:
- java implementation »
- implementation tree »
- selection machine »
- machine algorithm »
- basic selection »
- tree algorithm »
-
1
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
Get full text
Get full text
Get full text
Article -
2
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
Get full text
Get full text
Get full text
Thesis -
3
Robust correlation feature selection based support vector machine approach for high dimensional datasets
Published 2025“…The third step employs the support vector machine algorithm to calculate prediction values. …”
Get full text
Get full text
Get full text
Article -
4
Development of cell formation algorithm and model for cellular manufacturing system
Published 2011“…Therefore, for this proposes good benchmarked algorithm, bacteria foraging algorithm is selected and developed to solve multiobjective cell formation model and traced constraints satisfaction handling to produce feasible optimal solution. …”
Get full text
Get full text
Thesis -
5
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…This study proposes a car parking management system which applies Dijkstra’s algorithm, Ant Colony Optimization (ACO) and Binary Search Tree (BST) in structuring a guidance system for indoor parking. …”
Get full text
Get full text
Thesis -
6
Computer Lab Timetabling Using Genetic Algorithm Case Study - Unit ICT
Published 2006Get full text
Get full text
Thesis -
7
IMPLEMENTATION OF BEHAVIOUR BASED NAVIGATION IN A PHYSICALLY CONFINED SITE
Published 2017“…Selected basic behaviour-based algorithms such as wallfollower, obstacle avoidance, escape route and target detection are to be combined and its efficiency is measured. …”
Get full text
Get full text
Final Year Project -
8
A comparative analysis of machine learning approaches in sukuk price estimation across global regions
Published 2024“…Search terms include keywords related to Sukuk and machine learning. Selected papers are screened based on titles and abstracts to ensure relevance to the research topic, prioritizing those that explicitly discuss both Sukuk and machine learning. …”
Get full text
Get full text
Get full text
Article -
9
A Survey Of Supervised Machine Learning In Wireless Sensor Network: A Power Management Perspective
Published 2013“…Machine learning algorithms are iteration based algorithms, as the new knowledge is based on the previous predicted /calculated knowledge which helps to decrease errors in order to increase efficiency. …”
Get full text
Get full text
Conference or Workshop Item -
10
Classification of herbs plant diseases via hierarchical dynamic artificial neural network
Published 2010“…Basically, in this study, image processing and pattern classification are going to be used to implement a machine vision system that could identify and classify the visual symptoms of herb plants diseases. …”
Get full text
Get full text
Article -
11
Classification of herbs plant diseases via hierachical dynamic artificial neural network after image removal using kernel regression framework
Published 2011“…Basically, in this study, image processing and pattern classification are going to be used to implement a machine vision system that could identify and classify the visual symptoms of herb plants diseases. …”
Get full text
Get full text
Article -
12
-
13
Metaheuristic-Based Neural Network Training And Feature Selector For Intrusion Detection
Published 2019“…To realize these objectives, the research in this thesis follows three basic stages, succeeded by extensive evaluations.…”
Get full text
Get full text
Thesis -
14
-
15
Machine Learning Based Two Phase Detection and Mitigation Authentication Scheme for Denial-of-Service Attacks in Software Defined Networks
Published 2024“…This scheme incorporates machine learning techniques by utilizing Support Vector Machine (SVM) and K-Nearest Neighbors (KNN) classification algorithms to accurately identify and handle malicious network traffic following the initial packet filtration process that identifies abnormal traffic. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
16
-
17
-
18
An Optimized Support Vector Machine (SVM) based on Particle Swarm Optimization (PSO) for cryptocurrency forecasting
Published 2019“…However, forecasting result using basic SVM algorithms does not really promising. On the other hands, Particle Swarm Optimization (PSO) is known as a better algorithm for a static and simple optimization problem. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
19
Twofold Integer Programming Model for Improving Rough Set Classification Accuracy in Data Mining.
Published 2005“…The accuracy for rules and classification resulted from the TIP method are compared with other methods such as Standard Integer Programming (SIP) and Decision Related Integer Programming (DRIP) from Rough Set, Genetic Algorithm (GA), Johnson reducer, HoltelR method, Multiple Regression (MR), Neural Network (NN), Induction of Decision Tree Algorithm (ID3) and Base Learning Algorithm (C4.5); all other classifiers that are mostly used in the classification tasks. …”
Get full text
Get full text
Thesis -
20
Distance measure and its application to decision making, medical diagnosis, and pattern recognition problems under complex picture fuzzy sets
Published 2025“…The complex fuzzy sets, complex intuitionistic fuzzy sets, complex pythagorean fuzzy sets, and complex fermatean fuzzy sets cannot handle the neutrality grade of an object that plays an important role in medical diagnosis, network analysis, signal processing, human voting, and personnel selection problems. Therefore, in this article, we introduced the notion of complex picture fuzzy sets and investigated their basic properties. …”
Article
