Search Results - (( java implementation tree algorithm ) OR ( user computing values algorithm ))
Search alternatives:
- java implementation »
- implementation tree »
- computing values »
- values algorithm »
- tree algorithm »
- user computing »
-
1
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
Get full text
Get full text
Get full text
Article -
2
-
3
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
Get full text
Get full text
Get full text
Thesis -
4
-
5
Enhancement of RSA Key Generation Using Identity
Published 2015Get full text
Get full text
Get full text
Book Chapter -
6
PSAT : a pairwise test data generation tool based on simulated annealing algorithm
Published 2015Get full text
Get full text
Undergraduates Project Papers -
7
Cloudlet deployment and task offloading in mobile edge computing using variable-length whale and differential evolution optimization and analytical hierarchical process for decisio...
Published 2023“…VL-WIDE has accomplished a higher median value for the domination over state-of-the-art algorithms with a higher number of non- dominated solutions value than all other benchmarks. …”
Get full text
Get full text
Thesis -
8
-
9
T-way testing : a test case generator based on melody search algorithm
Published 2015Get full text
Get full text
Undergraduates Project Papers -
10
Pairwise test suite generator tool based on harmony search algorithm (HS-PTSGT)
Published 2014Get full text
Get full text
Undergraduates Project Papers -
11
A near-optimal centroids initialization in K-means algorithm using bees algorithm
Published 2009Get full text
Get full text
Get full text
Conference or Workshop Item -
12
Hybrid cryptography algorithm to improve security cloud storage
Published 2017“…Utilization of a solitary algorithm is not powerful for extra ordinary state security to information in cloud computing. …”
Get full text
Get full text
Get full text
Thesis -
13
The solution of 2048 puzzle game using A* algorithm / Zafhira Ismail
Published 2017Get full text
Get full text
Thesis -
14
Multi-objective scientific workflow scheduling algorithm in multi-cloud environment for satisfying QoS requirements
Published 2022“…Cloud computing is a high-performance distributed computing platform that integrates large-scale services. …”
Get full text
Get full text
Thesis -
15
-
16
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…This study proposes a car parking management system which applies Dijkstra’s algorithm, Ant Colony Optimization (ACO) and Binary Search Tree (BST) in structuring a guidance system for indoor parking. …”
Get full text
Get full text
Thesis -
17
Tag cloud algorithm with the inclusion of personality traits
Published 2014Get full text
Get full text
Get full text
Article -
18
Extreme learning machine for user location prediction in mobile environment
Published 2011“…Originality/value – A new computational intelligence modeling scheme, based on the ELM has been investigated, developed and implemented, as an efficient and more accurate predictive solution for determining position of mobile users based on location fingerprint data (SS and SQ).…”
Get full text
Get full text
Get full text
Article -
19
Artificial immune system based on real valued negative selection algorithms for anomaly detection
Published 2015“…Data have been tampered and altered either by a computer user or unauthorized access via hacking. In this research, the Negative Selection Algorithms were deployed. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
20
Extreme learning machine for user location prediction in mobile environment
Published 2011“…Originality/value – A new computational intelligence modeling scheme, based on the ELM has been investigated, developed and implemented, as an efficient and more accurate predictive solution for determining position of mobile users based on location fingerprint data (SS and SQ).…”
Get full text
Get full text
Get full text
Article
