Search Results - (( java implementation tree algorithm ) OR ( program detection clustering algorithm ))

  • Showing 1 - 13 results of 13
Refine Results
  1. 1
  2. 2

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3
  4. 4

    Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde by Ogunfolajin Maruff , Tunde

    Published 2022
    “…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6

    Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization by Mohammad Ata, Karimeh Ibrahim

    Published 2019
    “…This study proposes a car parking management system which applies Dijkstra’s algorithm, Ant Colony Optimization (ACO) and Binary Search Tree (BST) in structuring a guidance system for indoor parking. …”
    Get full text
    Get full text
    Thesis
  7. 7

    STATISTICAL FEATURE LEARNING THROUGH ENHANCED DELAUNAY CLUSTERING AND ENSEMBLE CLASSIFIERS FOR SKIN LESION SEGMENTATION AND CLASSIFICATION by Adil H., Khan, Dayang Nurfatimah, Awang Iskandar, Jawad F., Al-Asad, SAMIR, EL-NAKLA, SADIQ A., ALHUWAIDI

    Published 2021
    “…In this paper, we proposed profound learning strategy to address three primary assignments developing in the zone of skin lesion picture preparation, i.e., dermoscopic highlight, extraction and detection. A profound algorithm comprising of preprocessing in CIELAB color space and Delaunay triangulation based clustering along with Particle Swarm Optimization (PSO) is proposed for the segmentation. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Handwriting recognition using webcam for data entry by Xiang, W.Y., Sebastian, P.

    Published 2015
    “…The modules have its distinct characteristics which is trained using the Back-Propagation algorithm to cluster the pattern recognition capabilities among different samples of handwriting. …”
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    Handwriting recognition using webcam for data entry by Wong , Yoong Xiang

    Published 2014
    “…The modules have its distinct characteristics which is trained using the Back-Propagation algorithm to cluster the pattern recognition capabilities among different samples of handwriting. …”
    Get full text
    Get full text
    Final Year Project
  10. 10

    Characterization and pathogenicity of Rhizoctonia spp isolated from various crop species in different agroecosystems in Malaysia by Rashed, Osamah Zaid Ali

    Published 2017
    “…This will assist in planning for the right crop rotation and proper disease management programs.…”
    Get full text
    Get full text
    Thesis
  11. 11

    Random Amplified Polymorphic DNA Analysis of Four Breeds of Sheep in Malaysia by Vijaya Kumar

    Published 1999
    “…The neighbour-joining and the UPGMA trees based on the Dice's and Jaccard's similarity indices showed little or no consensus on the clustering of the individuals in each population. Genetic distance between populations ranged from 0.1040 to 0.1357 based on the Dice's algorithm while the distance based on the Jaccard's algorithm ranged from 0.1875 to 0.2381. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Preliminary study on genetic distance of Vibrio parahaemolyticus isolates from diseased fish and shrimp brackishwater ponds by random amplified polymorphic DNA (RAPD) in Malaysia by Musa, Najiah, Lee, K. L., Mohd Daud, Hassan, Mohamed Din, Mohamed Shariff, Mohd Lila, Mohd Azmi

    Published 2003
    “…Two published 10-mer arbitrary primers (Gen1-50-01 and Gen1-50-02) were used for detecting DNA polymorphisms. RAPDistance program (version 1.04) was used to analyze the RAPD patterns. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    New techniques incorporating computational intelligence based for voltage stability evaluation and improvement in power system / Nur Fadilah Ab. Aziz by Ab. Aziz, Nur Fadilah

    Published 2014
    “…In addition, a new method to detect weak areas in a system termed as Weak Area Clustering Margin (WACM) was also developed. …”
    Get full text
    Get full text
    Thesis