Search Results - (( java implementation tree algorithm ) OR ( knowledge contribution patterns algorithm ))
Search alternatives:
- contribution patterns »
- java implementation »
- implementation tree »
- tree algorithm »
-
1
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
Get full text
Get full text
Get full text
Article -
2
An algorithm for Elliott Waves pattern detection
Published 2018“…Based on this knowledge, an algorithm for detection of these patterns is designed, developed and tested. …”
Get full text
Get full text
Article -
3
An algorithm for Elliott Waves pattern detection
Published 2018“…Based on this knowledge, an algorithm for detection of these patterns is designed, developed and tested. …”
Get full text
Get full text
Article -
4
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
Get full text
Get full text
Get full text
Thesis -
5
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…This study proposes a car parking management system which applies Dijkstra’s algorithm, Ant Colony Optimization (ACO) and Binary Search Tree (BST) in structuring a guidance system for indoor parking. …”
Get full text
Get full text
Thesis -
6
KopiCulture: Unveiling Customer Loyalty in Malaysia's Coffee Market through Clustering Algorithms for Local Cafe Insights
Published 2024“…Using clustering algorithms such as KMeans, KMeans with Principal Component Analysis (PCA), single linkage, complete linkage, DBScan, and DBScan in conjunction with PCA, we identify distinct customer segments based on loyalty patterns. …”
Get full text
Get full text
Get full text
Get full text
Article -
7
Machine Learning Applications in Offense Type and Incidence Prediction
Published 2024“…By applying this algorithm, the study achieves a high level of precision in predicting various types of detrimental behavior, enabling a better understanding of their underlying patterns. …”
Get full text
Get full text
Get full text
Article -
8
APPLICATION OF LINK GRAMMAR IN SEMI-SUPERVISED NAMED ENTITY RECOGNITION FOR ACCIDENT DOMAIN
Published 2011“…In our research, extraction pattern from the first module will be fed to this algorithm and is used to make the prediction of named entity candidate category. …”
Get full text
Get full text
Thesis -
9
Determination of tree height based on tree crown using algorithm derived from UAV imagery / Suzanah Abdullah ... [et al.]
Published 2021Get full text
Get full text
Conference or Workshop Item -
10
A spatial decision support system framework for optimization of cropping pattern and water resources allocation at pasargard plains, fars province, Iran
Published 2014“…A unit response matrix groundwater model was coupled with a modified version of Genetic Algorithm (GA) in order to optimize cropping patterns and water allocation decisions. …”
Get full text
Get full text
Thesis -
11
-
12
Smart waste management system with IoT monitoring
Published 2023Get full text
Get full text
Get full text
Article -
13
Transitioning from information sharing to knowledge services: unpacking the evolution of rural media within the context of media integration
Published 2023“…The adaptability of TikTok’s content curation algorithms caters to diverse age groups, contributing significantly to user satisfaction. …”
Get full text
Get full text
Get full text
Article -
14
Fish Motion Trajectories Detection Algorithm Based on Spiking Neural Network (S/O: 12893)
Published 2017“…STDP algorithm) has learning capability in memory recall. …”
Get full text
Get full text
Monograph -
15
Bayesian network of influence of sociodemographic variables on dengue related knowledge, attitude, and practices in selected areas in Selangor, Malaysia
Published 2019“…There are many complex factors that contribute to the incidence of dengue, for example, climatic condition, environmental factors, socioeconomic status, socio-demographic variables, human behaviour, and health belief pattern among others. …”
Get full text
Get full text
Thesis -
16
Pattern extraction for programming performance evaluation using directed apriori
Published 2009Get full text
Get full text
Get full text
Conference or Workshop Item -
17
Ranking-based pruning and weighted support model for gene association in frequent itemsets / Sofianita Mutalib
Published 2019“…Biological domain is one of the critical areas that always seek for useful knowledge and patterns observed through available methods, including data mining. …”
Get full text
Get full text
Thesis -
18
Fuzzy-based classifier design for determining the eye movement data as an input reference in wheelchair motion control
Published 2015“…Since membership functions (MFs) are generated automatically, the proposed fuzzy learning algorithm can be viewed as a knowledge acquisition tool for classification problems. …”
Get full text
Get full text
Get full text
Article -
19
Classification of stock market index based on predictive fuzzy decision tree
Published 2005“…In particular, predictive FDT algorithm is based on the concept of degree of importance of attribute contributing to the classification. …”
Get full text
Get full text
Thesis -
20
An automated approach to elicit and validate security requirements of mobile application
Published 2018“…Mobile phone usage has continued to rise,and it is becoming more convenient for users to use mobile applications for booking hotels,conducting online transaction and online payment.In this case,secured applications are required to increase the confidence among mobile users.In order to achieve correct secure application,a correct security requirements needs to be elicited and defined.Additionally,it is also crucial for security requirements of mobile apps to fulfill basic quality attributes such as correct,consistent and complete (3Cs).However,few problems are found in eliciting security requirements for mobile apps.Firstly, most requirements engineers (RE) are identified to have less knowledge and understanding of security requirements attributes,leading to the failure of implementing the 3Cs of security requirements.Secondly,most of the elicitation and the validation of security requirements are conducted at the later stage of the development and leads to poor quality security requirements implementation which might resulted to project failure.Motivated from these problems,the objectives of this thesis are three-folds; 1) To analyze the security requirements for mobile apps, 2) To propose an approach to elicit and end-to-end validation of security requirement,and 3)To evaluate the efficacy in term of correctness and performance as well as usability of the approach.This thesis proposes a new automated approach to assist the elicitation and validation of security requirements.Here an automated tool support called MobiMEReq is also developed.For this, we have adopted Test Driven Development (TDD) methodology with semi-formalized models:i) Essential Use Cases (EUCs) and ii) Essential User Interface (EUI).We then divided our approach into two parts:1)Elicitation and 2)End-to-end validation security requirements.Further,we have developed pattern libraries to assist on the correct elicitation and validation.They are mobile Security attributes pattern library and mobile security pattern library.Then,we have constructed a new algorithm using fuzzy logic to assist on the prioritization of the test for better performance of validation.Finally,a comprehensive evaluation of the approach,comprising experiments of correctness test and usability test were conducted.Here,we have also evaluated the feedback from the industry experts especially on the usability of the automated approach and tool support.In summary,the findings of the evaluations show that our approach is able to contribute to the body of knowledge of mobile security requirements engineering especially in enhancing the performance and correctness level of security attribute elicitation and its usability for end-to-end elicitation and validation.It is found that the approach able to enhance the correctness level of the elicited security attribute compared to the manual approach,and produce correct generation of test.Then,the results of the usability test by the novice and experts show that the approach is useful in eliciting and validating security requirements at the early stage of application development and is able to ease the elicitation and validation process of security requirements of mobile apps.…”
Get full text
Get full text
Get full text
Thesis
