Search Results - (( java application model algorithm ) OR ( pre implementation tree algorithm ))
Search alternatives:
- implementation tree »
- pre implementation »
- application model »
- java application »
- model algorithm »
- tree algorithm »
-
1
Improved Boosting Algorithms by Pre-Pruning and Associative Rule Mining on Decision Trees for predicting Obstructive Sleep Apnea
Published 2017“…The improved algorithms were implemented in OSA dataset and UCI online databases for comparisons. …”
Get full text
Get full text
Get full text
Article -
2
-
3
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
4
Comparison Of Phylogenetic Trees Using Difference Distance Function Method
Published 2005“…The pre-processing is implemented using the Microsoft Visual C++. …”
Get full text
Get full text
Final Year Project Report / IMRAD -
5
Case Slicing Technique for Feature Selection
Published 2004“…The classification accuracy obtained from the CST method is compared to other selected classification methods such as Value Difference Metric (VDM), Pre-Category Feature Importance (PCF), Cross-Category Feature Importance (CCF), Instance-Based Algorithm (IB4), Decision Tree Algorithms such as Induction of Decision Tree Algorithm (ID3) and Base Learning Algorithm (C4.5), Rough Set methods such as Standard Integer Programming (SIP) and Decision Related Integer Programming (DRIP) and Neural Network methods such as the Multilayer method.…”
Get full text
Get full text
Thesis -
6
Car dealership web application
Published 2022“…The transfer learning algorithm pre-trained the River adaptive random forest regressor and classifier by transferring the tree structures and weights from the Scikit-learn fitted random forest regressor and classifier, respectively. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
7
Predicting Student Performance in Object Oriented Programming Using Decision Tree : A Case at Kolej Poly-Tech Mara, Kuantan
Published 2013“…The objective was to identify and implement the most accurate algorithm for the KPTM dataset and to come up with a good prediction model using decision tree technique. …”
Get full text
Get full text
Conference or Workshop Item -
8
Arabic Speaker Identification System for Forensic Authentication Using K-NN Algorithm
Published 2023Conference Paper -
9
Optimization of blood vessel detection in retina images using multithreading and native code for portable devices
Published 2013Get full text
Get full text
Conference or Workshop Item -
10
Real-time algorithmic music composition application.
Published 2022“…This project is about the study of evolutionary music, and focuses on the development of an algorithmic music composer using the Java programming language. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
11
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
12
Sales prediction for Adha Station by using predictive analytics
Published 2025“…Sales data were manually gathered and documented from January 2023 to December 2024 using receipts, and Microsoft Excel was employed to transfer the raw data from the receipts and do preliminary processing. Additionally, pre-processing is conducted using the RapidMiner application prior to mapping the cleaned data with three distinct algorithms for predictive analysis: Decision Tree, Random Forest, and Multiple Linear Regression techniques. …”
Get full text
Get full text
Student Project -
13
-
14
-
15
A Toolkit for Simulation of Desktop Grid Environment
Published 2014“…In this type of environment it is nearly impossible to prove the effectiveness of a scheduling algorithm. Hence the main objective of this study is to develop a desktop grid simulator toolkit for measuring and modeling scheduler algorithm performance. …”
Get full text
Get full text
Final Year Project -
16
Secure Image Steganography Using Encryption Algorithm
Published 2016“…The objective of this study is to enhance the confidentiality and security of the image steganography application by combining cryptography algorithm. In this proposed model, the RSA algorithm is used to encrypt a secret message into an unreadable ciphertext before hiding it in the image. …”
Get full text
Get full text
Conference or Workshop Item -
17
A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment
Published 2013“…This thesis describes original research in the field of software quality model by presenting a Feature Ranking Algorithm (FRA) for Pragmatic Quality Factor (PQF) model. …”
Get full text
Get full text
Get full text
Thesis -
18
Parallel distributed genetic algorithm development based on microcontrollers framework
Published 2023Subjects:Conference paper -
19
An improved diabetes risk prediction framework : An Indonesian case study
Published 2018“…In conclusion,DRPF is implementable as prototype and has been highly accepted by Indonesian practitioners as aid for the diagnostics of diabetes.…”
Get full text
Get full text
Get full text
Thesis -
20
Network game (Literati) / Chung Mei Kuen
Published 2003“…Therefore, efficient and robust servers that process separate client connections in separate threads are needed. Java applet is a well-known and widely used example of mobile code (a variation on the traditional client-server model). …”
Get full text
Get full text
Thesis
