Search Results - (( developing small virtualization algorithm ) OR ( java implementation tree algorithm ))

  • Showing 1 - 17 results of 17
Refine Results
  1. 1
  2. 2

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde by Ogunfolajin Maruff , Tunde

    Published 2022
    “…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    A Distributed Topology Control Method for Improving Energy Efficiency of Wireless Sensor Networks by Abd Aziz, Azrina, Sekercioglu, Ahmet

    Published 2012
    “…By using the TPSI algorithm, our method can build the virtual backbone in a fully distributed manner using localized information. …”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Modeling And Control Of V-Groove Rotary Impact Driver by Leong, Chi Hoe

    Published 2020
    “…A state-flow control algorithm is developed on the model to improve the mentioned shortfalls. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization by Mohammad Ata, Karimeh Ibrahim

    Published 2019
    “…This study proposes a car parking management system which applies Dijkstra’s algorithm, Ant Colony Optimization (ACO) and Binary Search Tree (BST) in structuring a guidance system for indoor parking. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Numerical analysis by Butcher, John

    Published 2008
    “…In the numerical solution of differential equations, where the numerical approximation is developed in small time-steps, there are typically three challenges. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8
  9. 9
  10. 10

    Position-based multicast routing in mobile ad hoc networks: an analytical study by Qabajeh, Mohammad M., Hassan Abdalla Hashim, Aisha, Khalifa, Othman Omran, Qabajeh, Liana K.

    Published 2012
    “…This protocol depends on the location information of the multicast members which is obtained using a location service algorithm. A virtual backbone structure has been proposed to perform this location service with minimum overhead and this structure is utilized to provide efficient packet transmissions in a dynamic mobile Ad hoc network environment. …”
    Get full text
    Get full text
    Article
  11. 11
  12. 12
  13. 13
  14. 14
  15. 15

    Finger-Vein Biometric Identification Using Convolutional Neural Network by Syafeeza, Ahmad Radzi, Mohamed, Khalil-Hani, Rabia, Bakhteri

    Published 2016
    “…The proposed CNN is tested on a finger-vein database developed in-house that contains 50 subjects with 10 samples from each finger. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Development of compound clustering techniques using hybrid soft-computing algorithms by Salim, Naomie, Shamsuddin, Siti Mariyam, Salleh @ Sallehuddin, Roselina, Alwee, Razana

    Published 2006
    “…The hierarchical fuzzy clustering algorithm developed in this work assign the overlapping structures (structures having more than one activity) to more than one clusters if their fuzzy membership values are significantly high for those clusters. …”
    Get full text
    Get full text
    Monograph
  17. 17

    Quality Of Service Aware User Association For Efficient Network Slicing In Multi-Tenant 5g Networks by Swathi, Subbiah Jayanthi

    Published 2022
    “…Multi-tenant network slicing allows multiple Mobile Virtual Network Operators (MVNOs) to share the physical network infrastructure, each known as a tenant, for service provisioning. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis