Search Results - (( java implementation tree algorithm ) OR ( basic communication system algorithm ))

Refine Results
  1. 1

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde by Ogunfolajin Maruff , Tunde

    Published 2022
    “…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    Dynamic communication performance of the TESH network under nonuniform traffic patterns by Rahman, M.M. Hafizur, Inoguchi, Yasushi, Sato, Yukinori, Miura, Yasuyuki, Horiguchi, Susumu

    Published 2009
    “…In this paper, we evaluate the dynamic communication performance of the TESH network using dimension order routing algorithm under various nonuniform traffic patterns. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization by Mohammad Ata, Karimeh Ibrahim

    Published 2019
    “…This study proposes a car parking management system which applies Dijkstra’s algorithm, Ant Colony Optimization (ACO) and Binary Search Tree (BST) in structuring a guidance system for indoor parking. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Noise Cancellation method in assistive listening system by Noor Aliff, Noor Affande

    Published 2020
    “…Noise cancellation system is proposed to resolve the problem. The noise cancellation system is categorized as active type of noise cancelling method as it includes adaptive filter and adaptive algorithm. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  6. 6

    A highly efficient algorithm for phased-array mmWave massive MIMO beamforming by Althuwayb, Ayman Abdulhadi, Hashim, Fazirulhisyam, Liew, Jiun Terng, Khan, Imran, Jeong, Woo Lee, Affum, Emmanuel Ampoma, Ouahabi, Abdeldjalil, Jacques, Sébastien

    Published 2021
    “…Importantly, it has an abundant resource spectrum, which can significantly increase the communication rate of a mobile communication system. …”
    Get full text
    Get full text
    Article
  7. 7

    Dynamic communication performance of a TESH network under the nonuniform traffic patterns by Rahman, M.M. Hafizur, Inoguchi, Yasushi, Sato, Yukinori, Miura, Yasuyuki, Horiguchi, Susumu

    Published 2008
    “…Hierarchical interconnection networks provide high performance at low cost by exploring the locality that exists in the communication patterns of massively parallel computer systems. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  8. 8
  9. 9

    Ant system with heuristics for capacitated vehicle routing problem by Tan, Wen Fang

    Published 2013
    “…The ASH algorithm is basically applied with its probabilistic decision rule and pheromone feedback to construct the sequences of customers to be visited in the CVRP solution. …”
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11
  12. 12
  13. 13
  14. 14

    Mobile Robot with Navigation Control and Communication by Mohammad Yatim, Amirah Izzati

    Published 2016
    “…Mobile Robot with Navigation Control and Communication is basically about a mobile robot where a list of instructions is needed to control the locomotion of the robot. …”
    Get full text
    Get full text
    Final Year Project
  15. 15
  16. 16
  17. 17
  18. 18
  19. 19

    A qualitative study of families of Edwards Curves and their applications in cryptography / Nurul Azwa Kamaruddin and Nurul Ain Mustakim by Kamaruddin, Nurul Azwa, Mustakim, Nurul Ain

    Published 2012
    “…Among those cryptosystems, there are three types of public key cryptographic systems that are currently considered both secure and efficient, classified according to the mathematical problems upon which they are based: the Integer Factorization Systems (of which the RSA algorithm is the most well known example), the Discrete logarithm Systems (such as the US Government’s Digital Signature Algorithm) and the Elliptic Curve Cryptosystem (ECC). …”
    Get full text
    Get full text
    Research Reports
  20. 20

    Development of land target following system of hexacopter by Zakaria, Abdul Hafiz, Mohd Mustafah, Yasir, M. Hatta, Muhd. Mudzakkir, N. Azlan, Muhd. Nadzif

    Published 2015
    “…This paper discussed the development of a land target following system for hexacopter using on-board camera. The camera will detect the specified land target during the flight of the hexacopter and communicate with the base station to produce the GPS location of the target for necessary actions. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper