Search Results - (( developing e process algorithm ) OR ( java implementation tree algorithm ))
Search alternatives:
- java implementation »
- implementation tree »
- process algorithm »
- tree algorithm »
- developing e »
- e process »
-
1
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
Get full text
Get full text
Get full text
Article -
2
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
Get full text
Get full text
Get full text
Thesis -
3
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…This study proposes a car parking management system which applies Dijkstra’s algorithm, Ant Colony Optimization (ACO) and Binary Search Tree (BST) in structuring a guidance system for indoor parking. …”
Get full text
Get full text
Thesis -
4
E4ML: Educational Tool for Machine Learning
Published 2003Get full text
Get full text
Conference or Workshop Item -
5
Real time algorithm for the portable recording of fetal and maternal heart rates
Published 2023Conference paper -
6
Enhanced gravitational search algorithm for nano-process parameter optimization problem / Norlina Mohd Sabri
Published 2020“…The analysis on the processing times has also shown that eGSA has been able to reduce its processing time compared to GSA and most of other algorithms. …”
Get full text
Get full text
Thesis -
7
Hybrid scheduling and dual queue scheduling
Published 2009Get full text
Get full text
Conference or Workshop Item -
8
-
9
-
10
-
11
-
12
-
13
-
14
-
15
Enhance key generation algorithm based user string identity as public key
Published 2015“…In the first experiment, an algorithm called the LB-RSA was developed. A looping process was added to this algorithm in order to produce a new modulo value to make the E-mail entered relative prime to the new modulo value, which helps to produce more E-mail addresses that can be used as public keys. …”
Get full text
Get full text
Thesis -
16
-
17
Development of Quantification Algorithm for Control Valve Stiction
Published 2009Get full text
Get full text
Get full text
Conference or Workshop Item -
18
Pengesan lalu lintas dengan kaedah pemerosesan imej
Published 2001“…This study was conducted to develop efficient traffic detector using image-processing with a personal compute I: Traffic images were captured using ordinary analogue video camera and digitised using a video blastel: Four algorithms were developed i. e. algorithm for traffic counting, algorithm for vehicle classification. algorithm to determine the speed of the counted vehicles and algorithm for incident detection. …”
Get full text
Get full text
Article -
19
Intelligent agent for e-commerce using genetic algorithm / Kok Sun Sun
Published 2000Get full text
Get full text
Thesis -
20
Hybrid scheduling and dual queue scheduling
Published 2009Get full text
Get full text
Get full text
Conference or Workshop Item
