Search Results - (( java implementation tree algorithm ) OR ( program identification task algorithm ))
Search alternatives:
- java implementation »
- implementation tree »
- identification task »
- tree algorithm »
- task algorithm »
-
1
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
Get full text
Get full text
Get full text
Article -
2
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
Get full text
Get full text
Get full text
Thesis -
3
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…This study proposes a car parking management system which applies Dijkstra’s algorithm, Ant Colony Optimization (ACO) and Binary Search Tree (BST) in structuring a guidance system for indoor parking. …”
Get full text
Get full text
Thesis -
4
A Machine Learning Classification Application to Identify Inefficient Novice Programmers
Published 2023Conference Paper -
5
A protocol for developing a classification system of mosquitoes using transfer learning
Published 2022“…Mosquito identification and classification are the most important steps in a surveillance program of mosquito-borne diseases. …”
Get full text
Get full text
Get full text
Article -
6
-
7
New techniques incorporating computational intelligence based for voltage stability evaluation and improvement in power system / Nur Fadilah Ab. Aziz
Published 2014“…The competency of VSCI was corroborated in three tasks; weak bus identification, automatic line outage contingency ranking and weak area identification. …”
Get full text
Get full text
Thesis -
8
Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC
Published 2021“…However, machines from different domains collaborate on the same data and task, raising security and privacy concerns about cross-domain communications. …”
Get full text
Get full text
Thesis
