Search Results - (( java implementation tree algorithm ) OR ( changes a normalization algorithm ))

Refine Results
  1. 1

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde by Ogunfolajin Maruff , Tunde

    Published 2022
    “…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization by Mohammad Ata, Karimeh Ibrahim

    Published 2019
    “…This study proposes a car parking management system which applies Dijkstra’s algorithm, Ant Colony Optimization (ACO) and Binary Search Tree (BST) in structuring a guidance system for indoor parking. …”
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5

    Widely linear dynamic quaternion valued least mean square algorithm for linear filtering by Mohammed, Aldulaimi Haydar Imad

    Published 2017
    “…In this thesis, a new quaternion gradient based adaptive algorithm for FIR adaptive filter is developed. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Early detection and mitigation of DDoS attacks in software defined networks by Al-Saadi, Mustafa Yahya Zakariya

    Published 2018
    “…To find the proper detection threshold a series of tests on different scenarios of normal and attack traffic were conducted. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Application of weighted average on modal parameters for damage detection algorithms: Case study on steel beam by Fayyadh, M.M., Abdul Razak, H.

    Published 2011
    “…Dynamic algorithms were compared to the change in the flexural rigidity as based on the change in the second moment of inertia of the beam cross-section at the crack zone. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Neighbour-based on-demand routing algorithms for mobile ad hoc networks by Ejmaa, Ali Mohamed E.

    Published 2017
    “…Accordingly, a Novel Density-Aware Routing algorithm (NDAR) is proposed. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    Weighting method for modal parameter based damage detection algorithms by Fayyadh, M.M., Abdul Razak, H.

    Published 2011
    “…Normally, there is a variance in the sensitivity of different modes and the global stiffness change is derived by taking the algebraic average, which is equivalent to the mean in statistical analysis terms. …”
    Get full text
    Get full text
    Article
  10. 10

    An improved recommender system based on normalization of matrix factorization and collaborative filtering algorithms by Zahid, Aafaq

    Published 2015
    “…It is concluded that the resultant hybrid techniques can perform well if the variables provided to normalization by neighborhood model (MF and CF) do not have big differences in order for the hybrid normalization model to outperform every algorithm in comparison.…”
    Get full text
    Get full text
    Thesis
  11. 11

    Abnormal data detection model based on autoencoder and random forest algorithm: camera sensor data in autonomous driving systems by Shengwen, Geng, Osman, Mohd Hafeez

    Published 2025
    “…Based on the above problems, this study addresses this challenge by proposing a hybrid anomaly detection model (called CAE-RF) that combines convolutional autoencoders and random forest algorithms to achieve efficient and accurate identification of abnormal data patterns to improve the safety of autonomous driving systems. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Adaptive interference canceller using analog algorithm with offset voltage by Mohammed, Alaa Hadi

    Published 2015
    “…LMS and NLMS algorithms have been used in a wide range of signal processing applications because of their simplicity in computations compared to the RLS algorithm. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Capture and estimate the speed of the object for remote monitoring / Nor Sajidah Ab Ghani by Ab Ghani, Nor Sajidah

    Published 2016
    “…The webcam is normally used for recording and capturing the image to sending a live video over conference calls or uploading the image to the social network. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Enhanced evolutionary algorithm with cuckoo search for nurse scheduling and rescheduling problem by Lim, Huai Tein

    Published 2015
    “…Therefore, to minimize the constraint violations and make little but attentive changes to a postulated schedule during a disruption, an integrated model of EA with Cuckoo Search (CS) is proposed. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Permission-based fault tolerant mutual exclusion algorithm for mobile Ad Hoc networks by Zarafshan, Faraneh

    Published 2015
    “…Token-based algorithms depend on circulation of a specific message known as token. …”
    Get full text
    Get full text
    Thesis
  16. 16

    An enhanced cluster head selection algorithm for routing in mobile AD-HOC network by Abdulsaheb, Ghaida Muttasher

    Published 2017
    “…Results indicate that the ECRP can achieve at least a 5% to 10% improvement compared with other cluster based algorithms.…”
    Get full text
    Get full text
    Thesis
  17. 17

    Investigation of evolutionary multi-objective algorithms in solving view selection problem / Seyed Hamid Talebian by Talebian, Seyed Hamid

    Published 2013
    “…Since analytical queries are complex and take a long time to be processed under normal circumstance, there is a need for a strategy to improve the speed of such queries. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Review of image denoising algorithms based on the wavelet transformation by Khmag, Asem, Ramli, Abdul Rahman, Hashim, Shaiful Jahari, Syed Mohamed, Syed Abdul Rahman Al-Haddad

    Published 2013
    “…All the algorithms show a high outstanding Performance when the image model corresponds to the algorithm assumptions but it fails in general and create artifacts or change the main structures of the original image. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Application of Genetic Algorithm in solving Tourist Routing Problem by Yusof, Siti Sarah

    Published 2013
    “…A rapid-prototyping methodology had been chosen because the author can immediately alter the prototype if there are any changes in the requirements. …”
    Get full text
    Get full text
    Final Year Project
  20. 20

    Top-Oil Thermal Model for Power Transformers that Reflects Ambient Temperature Profile in Malaysia by Azman S.N.A.B., Nik Ali N.H., Doolgindachbaporn A., Ariffin A.M., Azis N., Aminudin N.

    Published 2024
    “…The ambient temperature profile which is based on a few of the world continents' profiles and also specifically the ambient temperature profile in Malaysia are studied and presented by varying ambient temperatures in the IEC Standard mathematical algorithm. …”
    Conference Paper