Search Results - (( features expansion function algorithm ) OR ( java implementation tree algorithm ))

  • Showing 1 - 7 results of 7
Refine Results
  1. 1

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde by Ogunfolajin Maruff , Tunde

    Published 2022
    “…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    Modern fuzzy min max neural networks for pattern classification by Al Sayaydeh, Osama Nayel Ahmad

    Published 2019
    “…The MDFMM introduces a number of contributions in addition to modify the original FMM expansion activation function by replace it with that from the Enhanced Fuzzy Min Max (EFMM) to eliminate the overlapping cases. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization by Mohammad Ata, Karimeh Ibrahim

    Published 2019
    “…This study proposes a car parking management system which applies Dijkstra’s algorithm, Ant Colony Optimization (ACO) and Binary Search Tree (BST) in structuring a guidance system for indoor parking. …”
    Get full text
    Get full text
    Thesis
  5. 5

    An Education-Based System for Two-Way Translations of Sign Language by Muhammad Faiz Aiman, Che Umar, Hock Tze, Wong@ Farrah Wong, Sariah, Abang, Jamal, Ahmad Dargham, Seng Kheau, Chung, Mazlina, Mamat

    Published 2025
    “…To enhance the system's functionality, future work could focus on continuous signing, dataset expansion, and adaptive learning. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    SPY-BOT: Machine learning-enabled post filtering for social network-integrated industrial internet of things by Rahman, Md. Arafatur, Zaman, Nafees, Asyhari, A. Taufiq, Sadat, M. S. Nazmus, Pillai, Prashant, Ruzaini, Abdullah Arshah

    Published 2021
    “…The scheme creates class labels based on the featured keywords from the decision user and classifies suspicious contacts through the aid of ML. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    SPY-BOT: Machine learning-enabled post filtering for social network-integrated industrial internet of things by Rahman, Md. Arafatur, Zaman, Nafees, Asyhari, A. Taufiq, Nazmus Sadat, S. M., Pillai, Prashant, Ruzaini, Abdullah Arshah

    Published 2021
    “…The scheme creates class labels based on the featured keywords from the decision user and classifies suspicious contacts through the aid of ML. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article