Search Results - (( developing learning commitment algorithm ) OR ( java application tree algorithm ))
Search alternatives:
- commitment algorithm »
- learning commitment »
- java application »
- application tree »
- tree algorithm »
-
1
-
2
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
Get full text
Get full text
Get full text
Article -
3
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
4
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…This thesis is based on the application of sentiment classification algorithm to tweet data with the goal of classifying messages based on the polarity of sentiment towards a particular topic (or subject matter). …”
Get full text
Get full text
Get full text
Thesis -
5
Phishing attack detection using machine learning method
Published 2019“…This spam message includes the email and the SMS message that received by the user. There are several algorithms that can be used in the machine learning method to prevent the both attacks. …”
Get full text
Get full text
Get full text
Undergraduates Project Papers -
6
A novel navigation algorithm for collaborative multi robots
Published 2010“…But present unique challenges for developing collaborative navigation algorithm and coordination among themselves are not sufficient for autonomous collaborative tasks. …”
Get full text
Get full text
Get full text
Article -
7
A collaborative navigation algorithm for multi-agent robots in autonomous reconnaissance mission
Published 2010“…But present unique challenges for developing collaborative navigation algorithm and coordination among themselves are not sufficient for autonomous collaborative tasks. …”
Get full text
Get full text
Get full text
Proceeding Paper -
8
Review of the machine learning methods in the classification of phishing attack
Published 2019“…There are several algorithms that can be used in the machine learning method to prevent these attacks. …”
Get full text
Get full text
Get full text
Article -
9
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…In this paper, we propose an improvement of pattern growth-based PrefixSpan algorithm, called I-PrefixSpan. The general idea of I-PrefixSpan is to use the efficient data structure for general tree-like framework and separator database to reduce the execution time and memory usage. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
10
Fraud detection in shipping industry based on location using machine learning comparison techniques
Published 2023“…A number of popular existing algorithms were used to execute the model developed in Rapid tool such as Naïve Bayes , Neural Net , Deep Learning, Decision Tree, Logistic Regression, SVM and k-NN. …”
text::Thesis -
11
AI powered asthma prediction towards treatment formulation: an android app approach
Published 2022“…We utilized eight robust machine learning algorithms to analyze this dataset. We found that the Decision tree classifier had the best performance, out of the eight algorithms, with an accuracy of 87%. …”
Get full text
Get full text
Get full text
Article -
12
AI powered asthma prediction towards treatment formulation : An android app approach
Published 2022“…We utilized eight robust machine learning algorithms to analyze this dataset. We found that the Decision tree classifier had the best performance, out of the eight algorithms, with an accuracy of 87%. …”
Get full text
Get full text
Get full text
Article -
13
Meta-heuristic approaches for reservoir optimisation operation and investigation of climate change impact at Klang gate dam
Published 2023“…The Whale Optimisation Algorithm (WOA), Harris Hawks Optimisation (HHO) Algorithm, Lévy Flight WOA (LFWOA) and the Opposition-Based Learning of HHO (OBL-HHO) were proposed to simulate the initial model’s response and optimise the Klang Gate Dam (KGD) release operation with observed inflow, water level (storage), release, and evaporation rate (loss). …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
14
Bornean Orangutan nest classification using Image enhancement with convolutional neural network and kernel multi support vector machine classifier
Published 2025“…To address this, we propose automating the classification of captured images using machine learning algorithms. This research involves three key components: image processing, feature extraction, and image classification. …”
Get full text
Get full text
Get full text
Article -
15
Bornean Orangutan Nest Classification using Image Enhancement with Convolutional Neural Network and Kernel Multi Support Vector Machine Classifier
Published 2025“…To address this, we propose automating the classification of captured images using machine learning algorithms. This research involves three key components: image processing, feature extraction, and image classification. …”
Get full text
Get full text
Get full text
Get full text
Article
