Search Results - (( java implementation tree algorithm ) OR ( policy implementation some algorithm ))
Search alternatives:
- policy implementation »
- java implementation »
- implementation tree »
- implementation some »
- tree algorithm »
- some algorithm »
-
1
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
Get full text
Get full text
Get full text
Article -
2
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
Get full text
Get full text
Get full text
Thesis -
3
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…This study proposes a car parking management system which applies Dijkstra’s algorithm, Ant Colony Optimization (ACO) and Binary Search Tree (BST) in structuring a guidance system for indoor parking. …”
Get full text
Get full text
Thesis -
4
A hybrid model of system dynamics and genetic algorithm to increase crude palm oil production in Malaysia
Published 2018“…The hybrid of SD-GA through phase optimization process is capable to recommend policies that are plausible to be implemented to avoid unwarranted shock to the industry. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
5
Just Queuing: Policy-Based Scheduling Mechanism for Packet Switching Networks
Published 2011“…The diversity of Internet traffic requires some classification and prioritisation since some traffic deserve much attention with less delay and loss compared to others. …”
Get full text
Get full text
Get full text
Thesis -
6
Marine Predator Algorithm and Related Variants: A Systematic Review
Published 2025“…Findings reveal several search strategies implemented to improve the algorithm’s performance. …”
Get full text
Get full text
Article -
7
Marine Predator Algorithm and Related Variants: A Systematic Review
Published 2025“…Findings reveal several search strategies implemented to improve the algorithm’s performance. …”
Get full text
Get full text
Get full text
Get full text
Article -
8
Runtime pluggable CPU scheduler for linux operating system
Published 2010“…The CPU scheduler uses different scheduling policies (algorithms) to manage such processes. Each scheduling policy has its own properties and suits specific applications or a specific environment. …”
Get full text
Get full text
Thesis -
9
Ant Colony Optimization for Solving Solid Waste Collection Scheduling Problems
Published 2009“…Formulating this real life problem into vehicle routing problem with stochastic demand model and using some designed algorithms to minimize operation cost of solid waste management. …”
Get full text
Get full text
Get full text
Article -
10
Ant colony optimization for solving solid waste collection scheduling problems
Published 2009“…Formulating this real life problem into vehicle routing problem with stochastic demand model and using some designed algorithms to minimize operation cost of solid waste management. …”
Get full text
Get full text
Get full text
Article -
11
End-to-End Security Mechanism Using Blockchain for Industrial Internet of Things
Published 2025“…Moreover, our algorithm for the blockchain implementation is hybrid because this approach incorporates all the best features of the private and public implementation due to the individual blocks containing feasible information rather than the entire history.…”
Get full text
Get full text
Get full text
Article -
12
Modified ant colony optimization algorithms for deterministic and stochastic inventory routing problems / Lily Wong
Published 2018“…The computational results show that the algorithms which implement this new formulation are able to produce better solutions. …”
Get full text
Get full text
Get full text
Thesis -
13
Dynamic investment model for the restructed power market in the presence of wind source
Published 2014“…The proposed framework has been implemented in the hypothetical restructured power market using the IEEE Reliability Test System. …”
Get full text
Get full text
Thesis -
14
Secure multi-authority attribute-based encryption access control with cache-aware scheduling in mobile cloud computing
Published 2021“…However, some challenges are still outstanding due to the complexity of frequently changing the cryptographic enforcements of the owners’ access policies in the hosted cloud data files, and the key issuing process which poses computational and communicational overheads to data owners. …”
Get full text
Get full text
Thesis -
15
The transmission dynamic of the COVID 19 outbreak : a predictive dashboard
Published 2021“…Movement Control Order (MCO) and social distancing which have been implemented as control measures in Malaysia also affected many sectors. …”
Get full text
Get full text
Get full text
Article -
16
The transmission dynamic of the COVID 19 outbreak: A predictive dashboard
Published 2021“…Movement Control Order (MCO) and social distancing which have been implemented as control measures in Malaysia also affected many sectors. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
17
Developing students' mathematical thinking: how far have we came?
Published 2015“…Evidence show that there has been vast misalignment between the intended curriculum (the one prescribed by policy makers), the implemented curriculum (the one that is actually carried out by teachers in their classrooms) and the attained curriculum (the one learnt by students or on what was examined). …”
Get full text
Get full text
Get full text
Inaugural Lecture -
18
An industrial IoT-based blockchain-enabled secure searchable encryption approach for healthcare systems using neural network
Published 2022“…Although blockchain-enabled healthcare systems provide security, it may lead to some loopholes in the existing state of the art. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article
