Search Results - (( java implementation tree algorithm ) OR ( program integrated reporting algorithm ))
Search alternatives:
- integrated reporting »
- java implementation »
- implementation tree »
- reporting algorithm »
- tree algorithm »
-
1
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
Get full text
Get full text
Get full text
Article -
2
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
Get full text
Get full text
Get full text
Thesis -
3
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…This study proposes a car parking management system which applies Dijkstra’s algorithm, Ant Colony Optimization (ACO) and Binary Search Tree (BST) in structuring a guidance system for indoor parking. …”
Get full text
Get full text
Thesis -
4
PID TUNING OF DC MOTOR USING SWARM ITELLIGENCE ALGORITHM
Published 2012Get full text
Get full text
Final Year Project -
5
Vision-based robot indoor navigation
Published 2022“…This project aims to develop a vision-based navigation robot using OpenCV and C++ programming language in an indoor environment. The objective of this project is to design, develop and simulate programming code to perform image processing and path planning, integrate programming code with a microcontroller wirelessly, and test and evaluate the performance of the navigation robot. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
AI recommendation penetration testing tool for cross-site scripting: support vector machine algorithm
Published 2025“…This research introduces a new approach to enhancing cybersecurity by integrating Support Vector Machine (SVM) algorithms with penetration testing to develop a recommendation system focused on Cross-Site Scripting (XSS) attack detection. …”
Get full text
Get full text
Get full text
Article -
7
-
8
Coordinated Malware Eradication And Remediation Project (CMERP)
Published 2019Get full text
Get full text
Get full text
Technical Report -
9
Development of an integrated scheduling model for handling equipment in automated port container terminals
Published 2014“…In this research, a mixed-integer programming model is developed which considers the integration of ALVs, Quay Cranes and Yard Cranes at automated container terminals with unlimited buffer spaces. …”
Get full text
Get full text
Thesis -
10
Computer control of batch process plant (software development)
Published 1995“…The optimums PID parameters obtain arc being expected to be implement on the computer control of batch process plant software based on the real-time Proportional, Integral and Derivative (PID) algorithms. The algorithm has been successful tested using the Non-interacting Liquid Level Control of Three lank System plant models transfer function.…”
Get full text
Get full text
Student Project -
11
-
12
Maze Mouse
Published 2004“…To illustrate the integration of the three systems in the micromouse, a general block diagram has been constructed. …”
Get full text
Get full text
Final Year Project -
13
A low cost and portable microwave imaging system for breast tumor detection
Published 2017Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
14
Voltage tracking of a DC-DC buck converter using neural network control
Published 2012“…This master report presents a voltage tracking of a neural network for dc-dc buck converter. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
15
The study of transgene intergration hotspots in mammalia expression system
Published 2015Get full text
Get full text
Monograph -
16
-
17
Blind signature / Musfirah Mohd Ali
Published 2005“…Then, in order to construct the blind signature system that used an appropriate kind of method, the author did a deep research and comparison on the existing cryptography, programming languages, algorithms and systems which are explained in chapter two of this project. …”
Get full text
Get full text
Thesis -
18
Mobile Robot with Navigation Control and Communication
Published 2016Get full text
Get full text
Final Year Project -
19
PV boost converter conditioning using neural network
Published 2013“…This master report presents a voltage control system for DC-DC boost converter integrated with Photovoltaic (PV) array using optimized feed-forward neural network controller. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
20
Solar power inverter
Published 2013“…The controller executes the very precise algorithms required to invert the DC voltage generated by the solar module into AC This controller is programmed to perform the control loops necessary for all the power management functions necessary including DC/DC and DC/AC.…”
Get full text
Get full text
Undergraduates Project Papers
