Search Results - (( evaluate information needs algorithm ) OR ( java implementation tree algorithm ))
Search alternatives:
- evaluate information »
- java implementation »
- implementation tree »
- needs algorithm »
- tree algorithm »
-
1
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
Get full text
Get full text
Get full text
Thesis -
2
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
Get full text
Get full text
Get full text
Article -
3
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…This study proposes a car parking management system which applies Dijkstra’s algorithm, Ant Colony Optimization (ACO) and Binary Search Tree (BST) in structuring a guidance system for indoor parking. …”
Get full text
Get full text
Thesis -
4
Agent-based extraction algorithm for computational problem solving
Published 2015“…The tool is used to evaluate the accuracy of the proposed extraction algorithm to extract the appropriate information which are needed. …”
Get full text
Get full text
Thesis -
5
Designing New Block Cipher Based On Genetic Algorithm Approach
Published 2024“…In this research also, the algorithm has been tested with NIST Statistical Test suite to evaluate the randomness of the output. …”
Article -
6
An evaluation of feature selection technique for dendrite cell algorithm
Published 2014“…Dendrite cell algorithm needs appropriates feature to represents its specific input signals. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
7
-
8
Evaluation of Search Result of Document Search Based GA (DSEGA)
Published 2004“…It is composed by a series of module that using information retrieval method and genetic algorithm. …”
Get full text
Get full text
Get full text
Thesis -
9
Algorithm Development of Bidirectional Agglomerative Hierarchical Clustering Using AVL Tree with Visualization
Published 2024thesis::doctoral thesis -
10
A block cipher based on genetic algorithm
Published 2016“…In this research also, the algorithm has been tested with NIST Statistical Test suite to evaluate the randomness of the output. …”
Get full text
Get full text
Get full text
Thesis -
11
Influence maximisation towards target users and minimal diffusion of information based on information needs
Published 2020“…This study proposes the Information Diffusion towards Target Users (IDTU) algorithm to enhance influencer selection while minimizing the DC. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
12
Recommendation System Model For Decision Making in the E-Commerce Application
Published 2024thesis::doctoral thesis -
13
Movie recommendation using user-based collaborative filtering algorithm / Nur Ayuni Izlin Mat Ishor
Published 2019“…Thus, the study is to explore how the recommendation engines will work and use user-based collaborative filtering as an algorithm for the movie recommendation. Evaluation for this study is to evaluate the of reliability result of recommendation engine by using the approach algorithm. …”
Get full text
Get full text
Thesis -
14
A multi-layer dimension reduction algorithm for text mining of news in forex / Arman Khadjeh Nassirtoussi
Published 2015“…Therefore, this work produces a multi-layer dimension reduction algorithm to respond to this need. The algorithm tackles a different root cause of the problem at each layer. …”
Get full text
Get full text
Thesis -
15
Wormhole attack detection mechanism in mobile ad hoc network using neighborhood information and path tracing algorithm
Published 2015“…In this study, a new defence mechanism is proposed based on modification of the packet forwarding process, using Neighborhood Information (NI) and PT algorithm, and known as NIPT algorithm. …”
Get full text
Get full text
Thesis -
16
Chaotic-based encryption algorithm using henon and logistic maps for fingerprint template protection
Published 2020“…A series of simulations were conducted using MATLAB to evaluate the performance of the proposed chaotic-based encryption algorithm for FTP through different analyses covering key sensitivity, histogram, correlations, differential, information entropy, and encryption/decryption speed. …”
Get full text
Get full text
Get full text
Article -
17
Keyword indexing for text documents using signature files / Abdul Hakim A. Gafa
Published 2008“…In order to achieve the main objective, the Signature Files algorithm for indexing methods needs to be understood and implemented. …”
Get full text
Get full text
Thesis -
18
A Hybrid Approach For Web Search Result Clustering Based On Genetic Algorithm With K-means
Published 2024Get full text
journal::journal article -
19
Flower pollination algorithm for data generation and analytics - a diagnostic analysis
Published 2020“…The effectiveness of optimization in scientific and engineering applications has made optimization a popular area of scientific investigation in data generation and analytics leading to the design of several optimization algorithms. In view of the huge number of optimization algorithms in literature, there is the need for a thorough diagnostic evaluation so as to bring out the strengths and weaknesses of each technique: that way, assist researchers in making informed choices whenever they are confronted with an optimization problem. …”
Get full text
Get full text
Get full text
Article -
20
RSA algorithm performance in short messaging system exchange environment
Published 2011“…Short Message Service (SMS) is a widely service for brief communication.With the rise of mobile usage it has become a popular tool for transmitting sensitive information. This sensitive information should be totally secure and reliable to exchange.This urgent need for secure SMS, led to drive for RSA implementation, which is considered one of the strongest algorithms in security since we are going to bring big security into small device.Our main goal in this project is to design an experimental test bed application in order to use this application in evaluating the performance of RSA. …”
Get full text
Get full text
Get full text
Conference or Workshop Item
