Search Results - (( developing implementation method algorithm ) OR ( java application tree algorithm ))
Search alternatives:
- developing implementation »
- implementation method »
- method algorithm »
- java application »
- application tree »
- tree algorithm »
-
1
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
Get full text
Get full text
Get full text
Article -
2
-
3
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
4
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…This thesis is based on the application of sentiment classification algorithm to tweet data with the goal of classifying messages based on the polarity of sentiment towards a particular topic (or subject matter). …”
Get full text
Get full text
Get full text
Thesis -
5
IMPLEMENTATION OF IMAGE TEXTURE ANALYSIS USING GRAY LEVEL RUN LENGTH APPROACH
Published 2006“…The objective of this project is to develop algorithms inMATLAB and be able to implement image texture analysis by using the developed algorithms. …”
Get full text
Get full text
Final Year Project -
6
Development of android application for peninsular Malaysia GEOID height calculator / Mohamad Nazir Md Nazri
Published 2021“…This analysis is done to verify the algorithm of interpolation method and to find the best interpolation method for implement in the developed android application. …”
Get full text
Get full text
Thesis -
7
A modification of Shamir's Three-Pass protocol by implementing one-time pad algorithm / Nur Khairunnisa' Kusman, Nurul Hanis Abd Rashid and An Nur Ameera Zamani
Published 2019“…As a result, this study success to develop the algorithm by implemented one-time pad in Shamir's three-pass protocol. …”
Get full text
Get full text
Student Project -
8
Development of self-learning algorithm for autonomous system utilizing reinforcement learning and unsupervised weightless neural network / Yusman Yusof
Published 2019“…In the algorithm development a step-by-step example of the algorithm implementation is presented and then successfully implemented in Lego Mindstorm obstacle avoiding mobile robot as a proof of concept implementation of the hybrid AI algorithm. …”
Get full text
Get full text
Thesis -
9
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…In this paper, we propose an improvement of pattern growth-based PrefixSpan algorithm, called I-PrefixSpan. The general idea of I-PrefixSpan is to use the efficient data structure for general tree-like framework and separator database to reduce the execution time and memory usage. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
10
New Quarter-Sweep-Based Accelerated Over-Relaxation Iterative Algorithms and their Parallel Implementations in Solving the 2D Poisson Equation
Published 2010“…While all the above mentioned methods were implemented with SOR, among them, the QS point and MEG methods have never been implemented with AOR before. …”
Get full text
Get full text
Thesis -
11
Cryptanalysis of elliptic curve scalar multiplication algorithms
Published 2025“…This project explores scalar multiplication algorithms in Elliptic Curve Cryptography, focusing on the binary method and elliptic net method applied in Elliptic Curve Diffie-Hellman and Elliptic Curve Digital Signature Algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
12
Implementation of Color Filtering on FPGA
Published 2007“…The functionality of the algorithm is first verified in Matlab, simulating the expected output of the system before implementing it onto the FPGA development board. …”
Get full text
Get full text
Conference or Workshop Item -
13
Implementation of a modified incremental conductance MPPT algorithm with direct control based on a fuzzy duty cycle change estimator using dSPACE
Published 2014“…A controlled Cuk DC-DC converter was implemented and connected to a SunTech STP085B PV panel to verify the accuracy of the proposed method. …”
Get full text
Article -
14
Cryptanalysis of elliptic curve scalar multiplication algorithms
Published 2025“…This project explores scalar multiplication algorithms in Elliptic Curve Cryptography, focusing on the binary method and elliptic net method applied in Elliptic Curve Diffie-Hellman and Elliptic Curve Digital Signature Algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
15
AI powered asthma prediction towards treatment formulation: an android app approach
Published 2022“…We utilized eight robust machine learning algorithms to analyze this dataset. We found that the Decision tree classifier had the best performance, out of the eight algorithms, with an accuracy of 87%. …”
Get full text
Get full text
Get full text
Article -
16
Evaluation of the effectiveness and efficiency of Wagner and Fischer algorithm in retrieving Hadith translated documents / Kamarul Arifin Muhamad
Published 2002“…This thesis studies the method of a string-searching algorithm. The studies describe features and methods for string searching and comparison using Wagner and Fischer algorithm. …”
Get full text
Get full text
Thesis -
17
Literature Survey On Stereo Vision Disparity Map Algorithms
Published 2016“…To assist future researchers in developing their own stereo matching algorithms, a summary of the existing algorithms developed for every stage of processing is also provided. …”
Get full text
Get full text
Get full text
Article -
18
An FPGA implementation of exp-bet scheduling algorithm in LTE networks / Yusmardiah Yusuf
Published 2017“…Since the implementation of scheduling algorithm is an open issue in LTE, many packet scheduling algorithms have been proposed by researchers. …”
Get full text
Get full text
Thesis -
19
Cryptanalysis of elliptic curve scalar multiplication algorithms
Published 2025“…This project explores scalar multiplication algorithms in Elliptic Curve Cryptography, focusing on the binary method and elliptic net method applied in Elliptic Curve Diffie-Hellman and Elliptic Curve Digital Signature Algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
20
