Search Results - (( evolution communication tool algorithm ) OR ( java implementation tree algorithm ))
Search alternatives:
- evolution communication »
- java implementation »
- implementation tree »
- communication tool »
- tool algorithm »
- tree algorithm »
-
1
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
Get full text
Get full text
Get full text
Article -
2
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
Get full text
Get full text
Get full text
Thesis -
3
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…This study proposes a car parking management system which applies Dijkstra’s algorithm, Ant Colony Optimization (ACO) and Binary Search Tree (BST) in structuring a guidance system for indoor parking. …”
Get full text
Get full text
Thesis -
4
-
5
-
6
Bridging the gap: technological innovations and sustainability towards transforming disability products / Norida Abu Bakar … [et al.]
Published 2024“…From smart prosthetics equipped with sensor arrays and AI algorithms to wearable devices integrating biofeedback mechanisms, the landscape of assistive technology is undergoing a remarkable evolution. …”
Get full text
Get full text
Get full text
Book Section -
7
Optimizing Neural Network Prediction of Composite Fatigue Life Under Variable Amplitude Loading Using Bayesian Regularization
Published 2009“…Artificial neural networks (ANN) can provide new insight into the study of composite materials and can normally be combined with other artificial intelligence tools such as expert system, genetic algorithm, and fuzzy logic. …”
Get full text
Get full text
Book Section -
8
Toward Quantum-Resilient PKI: A Systematic Literature Review of Post-Quantum Certificates Model
Published 2026journal::journal article -
9
Spatial domain image steganography based on right most digit replacement and parity bit differencing / Mehdi Hussain
Published 2017“…This evolution has gained the drawbacks in the advancement of forgery tools and application that enable perpetrators to steal, alter and destroy information during transmission. …”
Get full text
Get full text
Get full text
Thesis
