Search Results - (( java implementation tree algorithm ) OR ( program detection packet algorithm ))

  • Showing 1 - 9 results of 9
Refine Results
  1. 1

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Effects of Authentication of Users in Mobile Internet Protocol Version 6 by Obenofunde, Simon Tabi

    Published 2004
    “…The results show that the average delay is not much affected by the implementation of the program. The network performance is greatly affected by the number .of packet present in the network at any given time. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde by Ogunfolajin Maruff , Tunde

    Published 2022
    “…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5

    Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization by Mohammad Ata, Karimeh Ibrahim

    Published 2019
    “…This study proposes a car parking management system which applies Dijkstra’s algorithm, Ant Colony Optimization (ACO) and Binary Search Tree (BST) in structuring a guidance system for indoor parking. …”
    Get full text
    Get full text
    Thesis
  6. 6

    New synchronization protocol for distributed system with TCP extension by Bayat, Peyman

    Published 2013
    “…These results show that the proposed algorithm, on average, has 7.97% higher fault-tolerance. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Secure communication in Vehicular ad hoc network using modified ad hoc on demand distance vector by Abdulkader, Zaid A.

    Published 2018
    “…The OMNET++ simulation program is used to justify the proposed algorithms. …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    A reliable time base routing framework with seamless networking operation for SDN / Nauman Khan by Nauman , Khan

    Published 2024
    “…It is framed as a mixed-integer linear programming problem. To address this complexity, this work presents a multi-objective heuristic algorithm in the framework with the help of other module inputs that efficiently determines the best path for upcoming affected flows and timely isolates the maintenance switch except for the critical switch. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9