Search Results - (( java implementation tree algorithm ) OR ( program intention a algorithm ))

Refine Results
  1. 1

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde by Ogunfolajin Maruff , Tunde

    Published 2022
    “…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization by Mohammad Ata, Karimeh Ibrahim

    Published 2019
    “…This study proposes a car parking management system which applies Dijkstra’s algorithm, Ant Colony Optimization (ACO) and Binary Search Tree (BST) in structuring a guidance system for indoor parking. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Power system intentional islanding for different contingency scenarios using discrete optimization technique by Nur Zawani Binti Saharuddin

    Published 2023
    “…Hence, this thesis proposed a Modified Discrete Evolutionary Programming (MDEP) to determine the optimal intentional islanding strategies for different large-scale power systems following a critical line outage. …”
    text::Thesis
  5. 5
  6. 6

    Agent-based extraction algorithm for computational problem solving by Rajabi, Maryam

    Published 2015
    “…Modeling Computational Problem Solving (CPS) is the main issue in teaching programming where the given text is needed to be transformed into a model then later into a programming language. …”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8
  9. 9
  10. 10

    A New Mobile Botnet Classification based on Permission and API Calls by Yusof, M, Saudi, MM, Ridzuan, F

    Published 2024
    “…Therefore, this paper presents a new mobile botnet classification based on permission and Application Programming Interface (API) calls in the smartphone. …”
    Proceedings Paper
  11. 11
  12. 12

    Electroencephalogram signal interpretation system for mobile robot by Hasan, Intan Helina

    Published 2013
    “…Using signals from the chosen four electrodes to evaluate the signal interpretation system, a success rate of 75-80% is received. With this system, user can expect a more convenient preparation with lesser electrodes used, and faster execution of the robot commands since they are pre-programmed according to user’s intention and selected route.…”
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14

    Test of Self Por [decoded] trait no. 2 / Syafiq Abdul Samat by Abdul Samat, Syafiq

    Published 2021
    “…In this masterpiece, I present another variation of Hingarmera algorithm titled “Noise Per Dot", which mimics some of the traits of making a painting. …”
    Get full text
    Get full text
    Book Section
  15. 15

    Power system network splitting and load frequency control optimization using ABC based algorithms / Kanendra Naidu a/l Vijyakumar by Vijyakumar, Kanendra Naidu

    Published 2015
    “…This research presents a modified optimization program for the system splitting problem in large scale power system based on Artificial Bee Colony algorithm and graph theory. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Kernel methods and support vector machines for handwriting recognition by Ahmad A.R., Khalid M., Yusof R.

    Published 2023
    “…SVM works by mapping training data for a classification task into a higher dimensional feature space using the kernel function and then finding a maximal margin hyperplane, which separates the mapped data. …”
    Conference paper
  17. 17

    Rationale of students' failure in comprehending theoretical computer science courses by Qureshi, M.A., Hassan, M.F., Sammi, R.

    Published 2014
    “…For a good programmer one need to have a solid back ground of algorithms i.e. …”
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18

    AI technology factors mediated via intention to use in UAE petroleum companies case study by Alblooshi, Surour Mohammed Surour Hamada

    Published 2024
    “…Artificial Intelligence (AI) represents a transformative force globally, with its computational prowess, data accessibility, and revolutionary algorithms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20