Search Results - (( java implementation tree algorithm ) OR ( changes _ normalization algorithm ))
Search alternatives:
- normalization algorithm »
- java implementation »
- implementation tree »
- tree algorithm »
-
1
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
Get full text
Get full text
Get full text
Article -
2
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
Get full text
Get full text
Get full text
Thesis -
3
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…This study proposes a car parking management system which applies Dijkstra’s algorithm, Ant Colony Optimization (ACO) and Binary Search Tree (BST) in structuring a guidance system for indoor parking. …”
Get full text
Get full text
Thesis -
4
-
5
Widely linear dynamic quaternion valued least mean square algorithm for linear filtering
Published 2017“…The new adaptive algorithm is called dynamic quaternion least mean square algorithm (DQLMS) because of the normalization process of the filter input and the variable step-size. …”
Get full text
Get full text
Get full text
Thesis -
6
Fire severity and post-fire generation using : Landsat [NDVI], [NBR] and [SAVI] / Nur Izzaty Dali
Published 2018“…Pre-fire and post-fire of Landsat 7 ETM+ images were obtained to identify the fire severity using Normalized Burn Ratio algorithms. The objectives of this study are (1) to produce Normalized Difference Vegetation Index (NDVI), Normalized Burn Ratio (NBR), and Soil Adjusted Vegetation Index (SAVI) and (2) to determine the changes of forest distribution based on NDVI, NBR and SAVI changes. …”
Get full text
Get full text
Thesis -
7
An improved recommender system based on normalization of matrix factorization and collaborative filtering algorithms
Published 2015“…It is concluded that the resultant hybrid techniques can perform well if the variables provided to normalization by neighborhood model (MF and CF) do not have big differences in order for the hybrid normalization model to outperform every algorithm in comparison.…”
Get full text
Get full text
Thesis -
8
Early detection and mitigation of DDoS attacks in software defined networks
Published 2018“…Then the next step was to test the mitigation algorithm, the same above scenarios of attack were repeated and the entropy change after the mitigation was observed. …”
Get full text
Get full text
Thesis -
9
Application of weighted average on modal parameters for damage detection algorithms: Case study on steel beam
Published 2011“…Dynamic algorithms were compared to the change in the flexural rigidity as based on the change in the second moment of inertia of the beam cross-section at the crack zone. …”
Get full text
Get full text
Get full text
Article -
10
Neighbour-based on-demand routing algorithms for mobile ad hoc networks
Published 2017“…The first algorithm DCFP outperforms the NCPR algorithm in terms of normalize routing overhead by 11.27%, while maintaining the same packet delivery ratio. …”
Get full text
Get full text
Get full text
Thesis -
11
Abnormal data detection model based on autoencoder and random forest algorithm: camera sensor data in autonomous driving systems
Published 2025“…Sensor failure, environmental changes, or bad weather can lead to the emergence of abnormal data, which can affect the decision-making process and may have disastrous consequences. …”
Get full text
Get full text
Get full text
Article -
12
Weighting method for modal parameter based damage detection algorithms
Published 2011“…When researchers use bending modes for the purpose of damage detection, a number of available modes are adopted, each of which return a value indicating the severity of damage. Normally, there is a variance in the sensitivity of different modes and the global stiffness change is derived by taking the algebraic average, which is equivalent to the mean in statistical analysis terms. …”
Get full text
Get full text
Article -
13
Analyzing land surface temperature in response to massive urbanization by using single window algorithm in Penang Island / Ainna Naeemah Zainal Abidin
Published 2019“…Consequently, as cities been developed, changes may occur not only in term of physical landscape but also caused changes in building, road and other infrastructures which then will take over the area of open land and vegetation. …”
Get full text
Get full text
Thesis -
14
Adaptive interference canceller using analog algorithm with offset voltage
Published 2015“…They require the utilization of the adaptive algorithms. Algorithms such as Least Mean Square (LMS), Normalized Least Mean Square (NLMS) and Recursive Least Square (RLS) algorithms often have poor numerical properties due to the practical implementation complexities. …”
Get full text
Get full text
Thesis -
15
Capture and estimate the speed of the object for remote monitoring / Nor Sajidah Ab Ghani
Published 2016“…Then, the Euclidean method is used to calculate the distance between the pixels to estimate the speed. The speed is only changed when the pixels are changed…”
Get full text
Get full text
Thesis -
16
Permission-based fault tolerant mutual exclusion algorithm for mobile Ad Hoc networks
Published 2015“…Nodes are mobile and topology of MANET changes very frequently and unpredictably. Due to these limitations, conventional mutual exclusion algorithms presented for distributed systems (DS) are not applicable for MANETs unless they attach to a mechanism for dynamic changes in their topology. …”
Get full text
Get full text
Thesis -
17
An enhanced cluster head selection algorithm for routing in mobile AD-HOC network
Published 2017“…The performance of ECRP algorithms was compared with other cluster based algorithms. …”
Get full text
Get full text
Thesis -
18
Enhanced evolutionary algorithm with cuckoo search for nurse scheduling and rescheduling problem
Published 2015“…By embedding the element, this gives a potential platform for enhancing the Evolutionary Algorithm (EA) which has been identified as the solution approach. …”
Get full text
Get full text
Get full text
Thesis -
19
Artificial immune system based on real valued negative selection algorithms for anomaly detection
Published 2015“…This shows that the Negative Selection Algorithms are equipped with the capabilities of detecting changes in data, thus appropriate for anomaly detection. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
20
Review of image denoising algorithms based on the wavelet transformation
Published 2013“…All the algorithms show a high outstanding Performance when the image model corresponds to the algorithm assumptions but it fails in general and create artifacts or change the main structures of the original image. …”
Get full text
Get full text
Get full text
Article
