Search Results - (( java implementation tree algorithm ) OR ( programming using coefficient algorithm ))

Refine Results
  1. 1

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde by Ogunfolajin Maruff , Tunde

    Published 2022
    “…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    Three-probe reflectometer algorithm for calculation of complex reflection coefficient of liquids / Aidil Saifan Abu Bakar by Abu Bakar, Aidil Saifan

    Published 2003
    “…In order to make precision measurement of magnitude and phase of reflection coefficient, the Three-Probe Reflectometer Algorithm has been used (which was implemented on the personal computer using Visual Basic 6 programming). …”
    Get full text
    Get full text
    Thesis
  4. 4

    Security analysis of blowfish algorithm by Alabaichi, Ashwak Mahmood, Ahmad, Faudziah, Mahmod, Ramlan

    Published 2013
    “…C++ is used in the implementation of the blowfish algorithm; MATLAB programming (Mathworks, R., 2012a) is used in the implementation of avalanche effect and correlation coefficient.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Security analysis of blowfish algorithm by Al-Abiachi, Ashwak M., Ahmad, Faudziah, Mahmod, Ramlan

    Published 2013
    “…The results obtained from the analysis of correlation coefficient showed that Blowfish algorithm gives a good nonlinear relation between plaintext and ciphertext while the results of avalanche effect indicate that the algorithm presents good avalanche effect from the second round.C++ is used in the implementation of the blowfish algorithm; MATLAB programming (Mathworks, R., 2012a) is used in the implementation of avalanche effect and correlation coefficient.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    Image classification using two dimensional wavelet coefficients with parallel computing by Ong, Yew Fai

    Published 2020
    “…Furthermore, colour threshold analysis and edge detection algorithms are redesigned exclusively to refine the two-dimensional coefficients into a more meaningful low-level representation. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  7. 7

    Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization by Mohammad Ata, Karimeh Ibrahim

    Published 2019
    “…This study proposes a car parking management system which applies Dijkstra’s algorithm, Ant Colony Optimization (ACO) and Binary Search Tree (BST) in structuring a guidance system for indoor parking. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Retrieving translated Al-Quran documents using edit distance technique / Ahmad Syukri Mohamad Zaid by Mohamad Zaid, Ahmad Syukri

    Published 2001
    “…This paper describes features and methods for string searching and comparison using Wagner and Fischer algorithm. The method is used in developing search engine because of its speed and efficiency since it is based on dynamic programming. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Evaluation of the effectiveness and efficiency of Wagner and Fischer algorithm in retrieving Hadith translated documents / Kamarul Arifin Muhamad by Muhamad, Kamarul Arifin

    Published 2002
    “…Two types of experiments are conducted. First experiment uses exact match, which is no method, is apply. Second experiment uses dynamic programmings apply with Wagner and Fischer algorithm.…”
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11

    Augmentation of basic-line-search and quick-simplex-method algorithms to enhance linear programming computational performance by Nor Azlan, Nor Asmaa Alyaa

    Published 2021
    “…The LP’s application is need to be further computed with a technique and Simplex algorithm is the one that commonly used. The Simplex algorithm has three stages of computation namely initialization, iterative calculation and termination. …”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    NN with DTW-FF Coefficients and Pitch Feature for Speaker Recognition by Sudirman, Rubita, Salleh, Sh-Hussain, Salleh, Shaharuddin

    Published 2006
    “…The results compare DTW using LPC coefficients to BPNN with DTW-FF coefficients; BPNN with DTW-FF coefficients shows a higher recognition rate than DTW with LPC coefficients. …”
    Get full text
    Get full text
    Article
  13. 13
  14. 14

    System identification using Extended Kalman Filter by Alias, Ahmad Hafizi

    Published 2017
    “…In order to evaluate the performance of the EKF learning algorithm, the proposed algorithm validation were analyzed using model validation methods as a checker such as One Step Ahead (OSA) and correlation coefficient (R2). …”
    Get full text
    Get full text
    Student Project
  15. 15

    Simulation of LMS algorithm for active noise cancellation / Ahmad Khairul Hafiz Abdullah by Abdullah, Ahmad Khairul Hafiz

    Published 2012
    “…Then, Xilinx ISE will be used to design the adaptive filter by using Verilog programming. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Solving economic load dispatch problem using genetic algorithm method / Norliza Kamarulzaman by Kamarulzaman, Norliza

    Published 2009
    “…The determination of power system operation of data is based on the generation output and coefficients involved. In this study, Genetic Algorithm method is used to overcome this problem. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Fast recovery of unknown coefficients in DCT-transformed images by Ong, Sim Ying, Li, Shujun, Wong, Kok Sheik, Tan, Kuan Yew

    Published 2017
    “…Recent research has shown that linear programming is a powerful tool to recover unknown coefficients in DCT-transformed images. …”
    Get full text
    Get full text
    Article
  18. 18

    Comparison Of Phylogenetic Trees Using Difference Distance Function Method by Maziah, Medin

    Published 2005
    “…The pre-processing is implemented using the Microsoft Visual C++. The phylogenetic tree is build using the PHYLlP (the PHYlogeny Inference Package), a package of programs for inferring phylogenies (evolutionary trees). …”
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  19. 19

    Effective software fault localization based on complex network theory / Abubakar Zakari by Abubakar , Zakari

    Published 2019
    “…In the case where a developer has checked 70% of the program statements and cannot fully localize all the multiple faults in a single diagnosis rank list, rather than resorting to using OBA bugging approach, a newly proposed community-based fault isolation approach that makes use of a divisive network community clustering algorithm is applied to aid in isolating faults into different fault-focused communities (clusters), each targeting a single fault. …”
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20