Search Results - (( java implementation tree algorithm ) OR ( programming using vs algorithm ))
Search alternatives:
- java implementation »
- implementation tree »
- tree algorithm »
- vs algorithm »
- using vs »
-
1
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
Get full text
Get full text
Get full text
Article -
2
Optimizing Visual Surveillance Sensor Coverage Using Dynamic Programming
Published 2017Get full text
Get full text
Article -
3
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
Get full text
Get full text
Get full text
Thesis -
4
-
5
Overview of metaheuristic: classification of population and trajectory
Published 2010“…Algorithms are used to find the solutions through the computer program. …”
Get full text
Get full text
Monograph -
6
Highest response ratio next (HRRN) vs first come first served (FCFS) scheduling algorithm in grid environment
Published 2011Get full text
Get full text
Conference or Workshop Item -
7
-
8
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…This study proposes a car parking management system which applies Dijkstra’s algorithm, Ant Colony Optimization (ACO) and Binary Search Tree (BST) in structuring a guidance system for indoor parking. …”
Get full text
Get full text
Thesis -
9
Reservoir system modelling using nondominated sorting genetic algorithm in the framework of climate change
Published 2014“…Whilst, Model B exclude the climate change factor by using Valencia Schaake model (VS) and Thomas Fiering model (TF). …”
Get full text
Get full text
Thesis -
10
-
11
-
12
A stylometry approach for blind linguistic steganalysis model against translation-based steganography
Published 2023“…While targeted steganalysis is designed to attack a specific embedding algorithm, blind steganalysis use features extracted or selection from the medium to detect any anomalies that indicate a possibility that a secret data has been embedded within the medium. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
13
