Search Results - (( java implementation tree algorithm ) OR ( basic activity selection algorithm ))

  • Showing 1 - 19 results of 19
Refine Results
  1. 1

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde by Ogunfolajin Maruff , Tunde

    Published 2022
    “…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization by Mohammad Ata, Karimeh Ibrahim

    Published 2019
    “…This study proposes a car parking management system which applies Dijkstra’s algorithm, Ant Colony Optimization (ACO) and Binary Search Tree (BST) in structuring a guidance system for indoor parking. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Intelligent agent for e-commerce using genetic algorithm / Kok Sun Sun by Kok , Sun Sun

    Published 2000
    “…The basic concept of the GA is the natural selection and survival of the fittest, which is identical to the human genetic. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Improving neural networks training using experiment design approach by Chong, Wei Kean

    Published 2005
    “…Randomly select the m data set for conventional training algorithm. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Building a feature-space for visual surveillance by Altahir, A.A., Asirvadam, V.S.

    Published 2014
    “…Visual surveillance applications play essential roles as a tool for archiving and to some extend preventing criminal activities. The future of visual surveillance applications relies on the developments in the area of computer vision, human motion analysis and computer algorithms. …”
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    Edge detection and contour segmentation for fruit classification in natural environment / Khairul Adilah Ahmad by Ahmad, Khairul Adilah

    Published 2018
    “…This reserarch adapted a methodology of computer vision and algorithms that exploit image segmentation, feature extraction and fuzzy classification to guide the research activities. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Development of durian ontology from unstructured text and external knowledge source / Khairul Nurmazianna Ismail by Ismail, Khairul Nurmazianna

    Published 2014
    “…In the webpages analysis phase, it has two activities namely HTML files selection and terms enumeration. …”
    Get full text
    Get full text
    Thesis
  9. 9

    MOTION TARGET TRACKING OF MOBILE ROBOTS by NOOR RASHID, NOOR AIMAN

    Published 2015
    “…The main hardware and has been tested with basic programs based on the algorithms of the said methods. …”
    Get full text
    Get full text
    Final Year Project
  10. 10

    Catalytic conversion of methane and carbon dioxide in conventional fixed bed and dielectric barrier discharge plasma reactors by Istadi, Istadi

    Published 2006
    “…Moreover, the operating parameters, such as the CO2/CH4 feed ratio and reactor temperature, and the catalyst compositions, such as wt% CaO and wt% MnO, were optimized by using Weighted Sum of Squared Objective Functions algorithm. The synergistic effect of basicity and reducibility towards the catalytic activity were also addressed using XRD, CO2-TPD and H2-TPR. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Hybridflood algorithms minimizing redundant messages and maximizing efficiency of search in unstructured P2P networks by Barjini, Hassan

    Published 2012
    “…Searching is an essential and basic activity for all P2P applications. Thus, there are a large number of research works have focused on unstructured P2P search facilities. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Comparative study of 3D reconstruction methods from 2D sequential images in sports by Azrulhizam Shapi’i, Pichak, Sanaz, Mohd Syazwan Baharuddin, Iida, Hiroyuki

    Published 2020
    “…This thesis investigated methods of 3D reconstruction from monocular image sequences in dynamic activities such as sports. Six recent methods were selected based on they focused on recovery fully automated system for estimating 3D human pose for 2D joint location. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13
  14. 14
  15. 15
  16. 16

    Early detection of high water saturation spots for landslide prediction using thermal image analysis by Aufa Huda, Muhammad Zin

    Published 2018
    “…Based on the literature found, there are many conventional methods to predict landslide that had been used previously such as remote sensing, wireless sensor network and many more. Basically, landslides happen due the many factors such as slope gradient factor, geological weathering and human-related activities such as deforestation. …”
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18
  19. 19

    Incremental learning for large-scale stream data and its application to cybersecurity by Ali, Siti Hajar Aminah

    Published 2015
    “…In Chapter 1, the concept of in�cremental learning is briefly described and basic theories on Resource Allocating Network (RAN) and conventional data selection method are discussed in this chapter. …”
    Get full text
    Get full text
    Thesis