Search Results - (( dramatic implementation level algorithm ) OR ( java application tree algorithm ))
Search alternatives:
- dramatic implementation »
- implementation level »
- java application »
- application tree »
- level algorithm »
- tree algorithm »
-
1
-
2
IMPLEMENTATION OF IMAGE TEXTURE ANALYSIS USING GRAY LEVEL RUN LENGTH APPROACH
Published 2006“…The objective of this project is to develop algorithms inMATLAB and be able to implement image texture analysis by using the developed algorithms. …”
Get full text
Get full text
Final Year Project -
3
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
Get full text
Get full text
Get full text
Article -
4
Mobile Travel Guide For Tourism
Published 2007“…To compute directions to a place, the system is implementing Dijkstra algorithm which is efficient to find the shortest path. …”
Get full text
Get full text
Final Year Project -
5
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
6
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…This thesis is based on the application of sentiment classification algorithm to tweet data with the goal of classifying messages based on the polarity of sentiment towards a particular topic (or subject matter). …”
Get full text
Get full text
Get full text
Thesis -
7
A technical framework analysis of digital twin control algorithms for HVAC-BMS Integration and implementation challenges for Malaysian green buildings
Published 2025“…Break-even points typically occur between 2.2 - 3.1 years, with ROI averaging 120% - 150% over five years. Security implementation increased dramatically from 34% prior to 2022 to 87%.…”
Get full text
Get full text
Get full text
Article -
8
An automatic diacritization algorithm for undiacritized Arabic text
Published 2017“…Moreover, this research is to implement and evaluate the accuracy of the algorithm for dialectal Arabic text. …”
Get full text
Get full text
Get full text
Thesis -
9
Students’ attitude towards video-based learning: machine learning analysis with rapid software / Abdullah Sani Abd Rahman ... [et al.]
Published 2022“…The recent computer and Internet technologies have dramatically impacted many facets of education. There has been a rapid rise mainly since the COVID19 pandemic in the use of video-based learning implemented via online classroom setting. …”
Get full text
Get full text
Get full text
Article -
10
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…In this paper, we propose an improvement of pattern growth-based PrefixSpan algorithm, called I-PrefixSpan. The general idea of I-PrefixSpan is to use the efficient data structure for general tree-like framework and separator database to reduce the execution time and memory usage. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
11
-
12
AI powered asthma prediction towards treatment formulation: an android app approach
Published 2022“…We utilized eight robust machine learning algorithms to analyze this dataset. We found that the Decision tree classifier had the best performance, out of the eight algorithms, with an accuracy of 87%. …”
Get full text
Get full text
Get full text
Article -
13
Beyond the classroom: digital language learning in the Malaysian context
Published 2024“…Break-even points typically occur between 2.2 - 3.1 years, with ROI averaging 120% - 150% over five years. Security implementation increased dramatically from 34% prior to 2022 to 87%.…”
Get full text
Get full text
Get full text
Article -
14
AI powered asthma prediction towards treatment formulation : An android app approach
Published 2022“…We utilized eight robust machine learning algorithms to analyze this dataset. We found that the Decision tree classifier had the best performance, out of the eight algorithms, with an accuracy of 87%. …”
Get full text
Get full text
Get full text
Article -
15
Security system using biometric technology: Design and implementation of voice recognition system (VRS)
Published 2008“…The technology lends itself well to a variety of uses and applications, including security access control for cell phones (to eliminate cell phone fraud), ATM manufacturers (to eliminate pin # fraud) and automobile manufacturers (to dramatically reduce theft and carjacking). In this paper, we present an implementation of a security system based on voice identification as the access control key. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
16
P300 detection of brain signals using a combination of wavelet transform techniques
Published 2012“…By reduction of recording EEG channels in the single trial based algorithms, the processing time of P300 detection decrease dramatically. …”
Get full text
Get full text
Thesis -
17
-
18
Meta-heuristic approaches for reservoir optimisation operation and investigation of climate change impact at Klang gate dam
Published 2023“…At the same time, the HHO and OBL-HHO algorithms resulted in lower levels of periodic reliability, with values of 13.16% and 9.21% respectively. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
19
Machine learning techniques for flood forecasting
Published 2025“…IGISMAPs datasets of water level and rainfall were investigated (1986?2000). …”
Article -
20
Development of low-overhead soft error mitigation technique for safety critical neural networks applications
Published 2021“…The SDC propagates from the physical level to the application level (SDC that occurs in hardware GPUs’ components) results in misclassification of objects in DNN models, leading to disastrous consequences. …”
Get full text
Get full text
Thesis
