Search Results - (( developing innovative perceptions algorithm ) OR ( java implementation tree algorithm ))

  • Showing 1 - 11 results of 11
Refine Results
  1. 1

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde by Ogunfolajin Maruff , Tunde

    Published 2022
    “…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization by Mohammad Ata, Karimeh Ibrahim

    Published 2019
    “…This study proposes a car parking management system which applies Dijkstra’s algorithm, Ant Colony Optimization (ACO) and Binary Search Tree (BST) in structuring a guidance system for indoor parking. …”
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10

    A review of automatic driving target detection based on camera and millimeter wave radar fusion technology by Tao, Zhenhua, Ngui, Wai Keng

    Published 2025
    “…Future research should focus on developing comprehensive multimodal datasets, 4D millimeter-wave radar, and refining fusion algorithms for robustness in diverse environments. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    An enhance embedding method using edge and textures detection for image steganography by Al-Maliki, Alaa Jabbar Qasim

    Published 2024
    “…The study contributes both theoretically and practically to the field of steganography by developing an innovative algorithm that enhances the security and robustness of image hidden data. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis