Search Results - (( java implementation tree algorithm ) OR ( programming model force algorithm ))

Refine Results
  1. 1

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde by Ogunfolajin Maruff , Tunde

    Published 2022
    “…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization by Mohammad Ata, Karimeh Ibrahim

    Published 2019
    “…This study proposes a car parking management system which applies Dijkstra’s algorithm, Ant Colony Optimization (ACO) and Binary Search Tree (BST) in structuring a guidance system for indoor parking. …”
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5

    Development of a building energy analysis package (BEAP) and its application to the analysis of cool thermal energy storage systems by Senawi, M. Y.

    Published 2001
    “…It involves the development of new programs and modifications of an existing simulation program. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Development of finite element model for soil-structure interaction by Shoaei, Mohammad Dalili

    Published 2014
    “…Then, the special finite element algorithm and computer program (2DSSI) is developed to perform two-dimensional nonlinear SSI analysis by considering interfacial behavior of soil and frame elements. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Machine learning model to predict the contact of angle using mineralogy, TOC and process parameters in shale by Ameenuddin Irfan, S., Fadhli, M.Z., Padmanabhan, E.

    Published 2021
    “…The application aims to develop a machine learning program using the algorithm of Support Vector Machine or Gaussian Process Regression to successfully predict the contact angle. …”
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    Adaptive constitutive analytical model code for rubber bearings with load-dependent variable analytical model in seismically isolated steel structures by Sadeghi, Adel, Hejazi, Farzad

    Published 2026
    “…The integration of these experimental results with the adaptive programming framework facilitated the development of a Variable Analytical Model (VAM) for the rubber bearings, which was compared against a conventional Constant Analytical Model (CAM) representing traditional modeling practices. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Classification models for higher learning scholarship award decisions by Wirawati Dewi Ahmad, Azuraliza Abu Bakar

    Published 2018
    “…A dataset of successful and unsuccessful applicants was taken and processed as training data and testing data used in the modelling process. Five algorithms were employed to develop a classification model in determining the award of the scholarship, namely J48, SVM, NB, ANN and RT algorithms. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10
  11. 11

    Numerical simulation of hybrid composite tubes under oblique compression by Ismail, Al Emran, Nezere, N.

    Published 2017
    “…Epoxy-reinforced fibers are wrapped around the steel tubes and it is then modeled numerically using the ANSYS finite element program. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Numerical investigation of vortex-induced vibrations of a flexible riser with staggered buoyancy elements by Wu, J., Lekkala, M.K.R., Ong, M.C.

    Published 2020
    “…The obtained hydrodynamic force coefficient database can be also applied to other empirical VIV prediction programs. …”
    Get full text
    Get full text
    Article
  13. 13

    Computer remote monitoring via mobile phones using socket programming / Samih Omer Fadlelmola Elkhider by Omer Fadlelmola Elkhider, Samih

    Published 2011
    “…The studies show beyond technical algorithms, physical aspects plays a big rule in client server model. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Design and Development of a Vision System Interface for Three Degree of Freedom Agricultural Robot by Omrane, Bouketir

    Published 1999
    “…This differential system represents the dynamic model, which describes relationships between robot motion and forces causing that motion. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Form Finding And Shape Change Analysis Of Spine Inspired Bio-Tensegrity Model by Oh, Chai Lian

    Published 2017
    “…The shape change of SBS models towards target state is achieved by means of forced elongation of cable. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Human evacuation movement simulation model: Concepts and techniques by Noor Akma, Abu Bakar, Lim, Siew Mooi, Abdul Majid, Mazlina

    Published 2022
    “…A program with a running algorithm of a computer model is called a computer simulation. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17

    Human evacuation movement simulation model: Concepts and techniques by Noor Akma, Abu Bakar, Lim, Siew Mooi, Abdul Majid, Mazlina

    Published 2022
    “…A program with a running algorithm of a computer model is called a computer simulation. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18

    Enhancing cloud data security using hybrid of advanced encryption standard and Blowfish encryption algorithms by -, Salma, Olanrewaju, Rashidah Funke, Abdullah, Khaizuran, -, Rusmala, Darwis, Herdianti

    Published 2019
    “…There are many research has been done on security of file encryption with AES algorithm. There is no any successful attack yet against AES but because of a higher increasing of cybercrime it could be possible attack on it like brute force attack and algebraic attack. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  19. 19

    Numerical solution for Duffing-Van Der Pol Oscillator via block method by Rasedee, Ahmad Fadly Nurullah, Abdul Sathar, Mohamad Hassan, Tze, Jin Wong, Lee, Feng Koo, Ramli, Nur Ainna

    Published 2021
    “…The two-point block algorithm will be coded in C programming to minimize computational cost (calculation time). …”
    Get full text
    Get full text
    Article
  20. 20