Search Results - (( java implementation tree algorithm ) OR ( basic data normalization algorithm ))
Search alternatives:
- normalization algorithm »
- java implementation »
- implementation tree »
- data normalization »
- tree algorithm »
- basic data »
-
1
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
Get full text
Get full text
Get full text
Article -
2
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
Get full text
Get full text
Get full text
Thesis -
3
Improved normalization and standardization techniques for higher purity in K-means clustering
Published 2016“…Clustering is basically one of the major sources of primary data mining tools, which make researchers understand the natural grouping of attributes in datasets. …”
Get full text
Get full text
Get full text
Article -
4
-
5
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…This study proposes a car parking management system which applies Dijkstra’s algorithm, Ant Colony Optimization (ACO) and Binary Search Tree (BST) in structuring a guidance system for indoor parking. …”
Get full text
Get full text
Thesis -
6
Voting algorithms for large scale fault-tolerant systems
Published 2011“…By extracting various plots from different aspects, we demonstrated that, compared to the basic algorithm, our algorithm has higher reliability and availability as the quantity of the input data increases. …”
Get full text
Get full text
Thesis -
7
-
8
Performance enhancement of adaptive cluster formation and routing protocols in wireless networks
Published 2017“…This thesis describes an analysis on the effect of these challenges on the perceived video quality over MANET which is considered the important network in many studies. An enhanced algorithm has been suggested to improve the video quality using routing algorithm which is used to transfer the data packets with minimum number of errors. …”
Get full text
Get full text
Get full text
Thesis -
9
-
10
Agent-based extraction algorithm for computational problem solving
Published 2015“…The basic statistical frequency method was used to analyse the performance result. …”
Get full text
Get full text
Thesis -
11
Dynamic traffic light flow control system using on-road sensor technology / Mohamed Irfan
Published 2017“…The controller uses Traffic Light Signal Manipulation Algorithm (TLSMA) to dynamically change in the traffic signals by using the data generated by the sensors. …”
Get full text
Get full text
Get full text
Thesis -
12
A Review on the Development of Indonesian Sign Language Recognition System
Published 2013“…However, communication with normal people is a major handicap for them since normal people do not understand their sign language. …”
Get full text
Get full text
Get full text
Article -
13
Students Activity Recognition By Heart Rate Monitoring In Classroom Using K-means Classification
Published 2024Get full text
journal::journal article -
14
Machine learning as new approach for predicting of maxillary sinus volume, a sexual dimorphic study
Published 2023“…In this retrospective study, we used data from 150 patients with normal maxillary sinuses to train and evaluate a Python ML algorithm for its ability to predict MSV from basic patient demographics (age, gender) and sinus length measurements in three directions (anteroposterior, mediolateral, and superoinferior). …”
Get full text
Get full text
Get full text
Article -
15
Robust Kernel Density Function Estimation
Published 2010“…The results of the study indicate that the proposed methods are capable of labelling normal observation and potential outliers in a data set. …”
Get full text
Get full text
Thesis -
16
Extention and cryptanalysis of golden cryptography
Published 2015“…On the other hand, the encryption algorithm of GC is more suitable for textual data and cannot be directly applied to images. …”
Get full text
Get full text
Thesis -
17
Challenges of hidden data in the unused area two within executable files
Published 2009“…Results: The programs were coded in Java computer language and implemented on Pentium PC. The designed algorithms were intended to help in proposed system aim to hide and retract information (data file) with in unused area 2 of any execution file(exe.file). …”
Get full text
Get full text
Get full text
Article -
18
Comparison of Landsat 8, Sentinel-2 and spectral indices combinations for Google Earth Engine-based land use mapping in the Johor River Basin, Malaysia
Published 2021“…It is also an indispensable basic information for local land management departments in land use planning and management. …”
Get full text
Get full text
Get full text
Article -
19
Prediction Of Antimicrobial Peptides Based On Sequence Alignment And Secondary Structure Sequence And Segment Sequence.pdf
Published 2015“…Keputusan ujian keseluruhan adalah 83.27% bagi set data biasa, 71.83% untuk urutan yang mempunyai persamaan <0.7, dan 91.49% untuk CAMP set data. …”
Get full text
Get full text
Thesis -
20
Inversion of 2D and 3D DC resistivity imaging data for high contrast geophysical regions using artificial neural networks / Ahmad Neyamadpour
Published 2010“…These results show that,for all the arrays (2D and 3D) except 3D pole - dipole data, resilient propagation is the most efficient algorithm for training the DC resistivity data. …”
Get full text
Get full text
Thesis
