Search Results - (( developing control tree algorithm ) OR ( java validation using algorithm ))
Search alternatives:
- developing control »
- validation using »
- java validation »
- using algorithm »
- tree algorithm »
- control tree »
-
1
Effective k-Means Clustering in Greedy Prepruned Tree-based Classification for Obstructive Sleep Apnea
Published 2022“…Incorporation of prepruned decision trees to kmeans clustering through one to three types of tree-depth controllers and cluster partitioning was done to develop a combined algorithm named as Greedy Pre-pruned Treebased Clustering (GPrTC) algorithm. …”
Get full text
Get full text
Get full text
Article -
2
BMTutor research design: Malay sentence parse tree visualization
Published 2014Get full text
Get full text
Get full text
Conference or Workshop Item -
3
Streamflow Prediction Utilizing Deep Learning and Machine Learning Algorithms for Sustainable Water Supply Management
Published 2024Subjects:Article -
4
A study of graduate on time (GOT) for Ph.D students using decision tree model
Published 2019“…Therefore, this study aims to classify the Ph.D students into the group of “GOT achiever” and “non-GOT achiever” by using decision tree models. Historical data that related to all Ph.D students in a public university in Malaysia has been obtained directly from the database of Graduate Academic Information System (GAIS) in order to develop and compare the performance of decision tree models (Chi-square algorithm, Gini index algorithm, Entropy algorithm and an interactive decision tree). …”
Get full text
Get full text
Get full text
Article -
5
-
6
Application Of Multi-Layer Perceptron Technique To Detect And Locate The Base Of A Young Corn Plant
Published 2007“…In this research, a vision system algorithm has been developed to identify and locate base of young corn trees based upon robot vision technology, pattern recognition techniques, and knowledge-based decision theory. …”
Get full text
Get full text
Thesis -
7
A Bio-Inspired Territorial Predator Scent Marking Algorithm in Software-Defined Data Center
Published 2023Conference Paper -
8
Priority and dynamic quantum time algorithms for central processing unit scheduling
Published 2018“…Central Processing Unit is scheduled using different types of scheduling algorithms. One of the most widely algorithm used in scheduling with sharing and batch operating systems is Round Robin. …”
Get full text
Get full text
Thesis -
9
A Model for Evaluation of Cryptography Algorithm on UUM Portal
Published 2004“…The simulation model was developed using Active Server Page, JavaScript and SQL 7.0 as database. …”
Get full text
Get full text
Get full text
Thesis -
10
-
11
Design and performance analysis of a fast 4-way set associative cache controller using Tree Pseudo Least Recently Used algorithm
Published 2023“…Central to this study is the development of an innovative cache controller for a 4-way set associative cache, meticulously crafted using VHDL and structured as a Finite State Machine. …”
Get full text
Get full text
Get full text
Get full text
Article -
12
Developing A Prediction Tool To Improve The Shading Efficiency Of The Pedestrian Zones
Published 2020“…The shading efficiency represented the percentage of the shaded area to the total floor area of the pedestrian zone, while the targeted shading efficiency indicated the preferable shading requirements for the pedestrian. The development of the prediction tool was conducted base on integrating three sequenced algorithms, which are sun position algorithm, shadow length and position algorithm, and expansion limit algorithm. …”
Get full text
Get full text
Thesis -
13
Algorithms of Classification of Mass Problems of Production Subject Domains
Published 2019“…This paper develops the algorithms for classification of mass problems of production subject domains. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
14
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…In addition, the randomness of the session key generated from the MLCG is verified using NIST test suite. Besides that, the security of the proposed protocol is validated using the formal analysis tool, AVISPA. …”
Get full text
Get full text
Thesis -
15
Deploying clustered wireless sensor network by multi-robot system
Published 2014Get full text
Get full text
Conference or Workshop Item -
16
Intersection Features For Android Botnet Classification
Published 2019“…Many of IoT devices will be supposedly controlled through a mobile, giving application (apps) developers great opportunities in the development of new applications. …”
Get full text
Get full text
Get full text
Article -
17
A framework of test case prioritisation in regression testing using particle swarm-artificial bee colony algorithm
Published 2024“…Ten knowledge and domain experts provided positive feedback on the framework's verification, affirming the framework's robustness. Validation was conducted through three experiments involving four Java programs. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
18
-
19
Cloud Worm Detection and Response Technique By Integrating The Enhanced Genetic Algorithm An Threat Level
Published 2024thesis::doctoral thesis -
20
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…On the Construction phase, the development of the prototype has been started. All the algorithm for the engine has been developed by using Java script language. …”
Get full text
Get full text
Thesis
