Search Results - (( developing finding replication algorithm ) OR ( java implementation tree algorithm ))

  • Showing 1 - 13 results of 13
Refine Results
  1. 1

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2
  3. 3

    Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde by Ogunfolajin Maruff , Tunde

    Published 2022
    “…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization by Mohammad Ata, Karimeh Ibrahim

    Published 2019
    “…This study proposes a car parking management system which applies Dijkstra’s algorithm, Ant Colony Optimization (ACO) and Binary Search Tree (BST) in structuring a guidance system for indoor parking. …”
    Get full text
    Get full text
    Thesis
  5. 5

    A sequential handwriting recognition model based on a dynamically configurable convolution recurrent neural network and hybrid salp swarm algorithm by Ahmed Ali Mohammed, Al-saffar

    Published 2024
    “…The built DCCRNN is based on the Salp Swarm optimization Algorithm (SSA), a processor that given a particular dataset will find the best CRNN’s structure and hyperparameters. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Study of hand gesture recognition using impulse radio ultra wideband (IRUWB) radar sensor by Terence Jerome Daim

    Published 2023
    “…Documentation of the development process ensures the methodology and findings are well-documented for reference and replication. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    Efficient Malware Detection And Response Model Using Enhanced Parallel Deep Learning (EPDL-MDR) by Chowdhury Sajadul Islam

    Published 2026
    “…These integrations reduce detection latency and false positives while supporting timely threat mitigation. The findings of this research will provide a valuable foundation for future researchers seeking to develop improved datasets and enhance malware detection and response models.…”
    thesis::doctoral thesis
  9. 9

    Evaluation of SongketChain : A Framework to Protect Unique Cultural Product using Blockchain Technology by Muhammad Hassif Imran, Muhammad Harris Irwan, Johari, Abdullah, Adnan Shahid, Khan, Nayeem Ahmad, Khan

    Published 2025
    “…The findings demonstrate that blockchain technology can play a crucial role in protecting cultural heritage, offering a replicable model for other traditional crafts facing similar challenges. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  10. 10
  11. 11

    Bouc-Wen model parameter identification for a new magneto-rheologigal fluid damper using particle swarm optimization by Mohd Azraai, Mohd Razman

    Published 2014
    “…The objectives are succinct in three main criteria starting with the development of MR fluid damper, then a representation of hysteresis model and lastly optimizing these parameters by inducing PSO algorithm. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Multi-parametric optimization of aerodynamic performance and pedestrian crash in sedan front-end profiles by Nor Azman, Afzatul Najwa

    Published 2025
    “…A multiobjective optimization framework was developed using computational simulations, mathematical modelling, and evolutionary algorithms. …”
    Get full text
    Get full text
    Thesis
  13. 13