Search Results - (( java application tree algorithm ) OR ( based content ((method algorithm) OR (path algorithm)) ))
Search alternatives:
- java application »
- application tree »
- method algorithm »
- tree algorithm »
- path algorithm »
- based content »
-
1
Meta-Heuristic Algorithms for Learning Path Recommender at MOOC
Published 2021“…Our model can generate an appropriate learning path for learners based on their background and job goals. …”
Get full text
Get full text
Article -
2
-
3
-
4
-
5
-
6
African Buffalo Optimization (ABO): A New Metaheuristic Algorithm
Published 2015Get full text
Get full text
Get full text
Article -
7
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
Get full text
Get full text
Get full text
Article -
8
Smart geographical routing protocol achieving high QoS and energy efficiency based for wireless multimedia sensor networks
Published 2021“…This algorithm routes multimedia packets across a WSN by choosing high- throughput paths rather than always choosing the shorter path to the sink. …”
Get full text
Get full text
Article -
9
-
10
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
11
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…This thesis is based on the application of sentiment classification algorithm to tweet data with the goal of classifying messages based on the polarity of sentiment towards a particular topic (or subject matter). …”
Get full text
Get full text
Get full text
Thesis -
12
Efficient flow-based channel assignment schemes for congestion avoidance in wireless mesh networks
Published 2016“…However, as a result of contention-based nature of IEEE 802.11-based wireless mesh network, the node capacity is limited by the contention, interference caused by hidden nodes, data transmission over low rate links, and frequent interface switching. …”
Get full text
Get full text
Thesis -
13
-
14
A new SMS spam detection method using both Content-Based and non Content-Based features
Published 2024Subjects:Conference Paper -
15
A selective approach for energy-aware video content adaptation decision-taking engine in android based smartphone
Published 2019“…In term of QoE subjective test, EnVADE algorithm score surpasses the score of other video streaming method. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
16
A selective approach for energy-aware video content adaptation decision-taking engine in android based smartphone
Published 2019“…In term of QoE subjective test, EnVADE algorithm score surpasses the score of other video streaming method. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
17
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…In this paper, we propose an improvement of pattern growth-based PrefixSpan algorithm, called I-PrefixSpan. The general idea of I-PrefixSpan is to use the efficient data structure for general tree-like framework and separator database to reduce the execution time and memory usage. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
18
A wavelet based watermarking algorithm for video
Published 2005“…So digital watermarking technique which aims at copyright protection of digital contents becomes more and more important, and various watermarking methods have been proposed. …”
Get full text
Get full text
Conference or Workshop Item -
19
Content-based recommender system for an academic social network / Vala Ali Rohani
Published 2014“…The content-based method is employed more widely though. …”
Get full text
Get full text
Thesis -
20
An improved framework for content and link-based web spam detection: a combined approach
Published 2021“…The content-based web spam detection framework uses three proposed and two improved content-based algorithms for web spam detection. …”
Get full text
Get full text
Get full text
Get full text
Thesis
