Search Results - (( java implementation tree algorithm ) OR ( user validation study algorithm ))
Search alternatives:
- java implementation »
- implementation tree »
- user validation »
- tree algorithm »
-
1
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…The circuits have been designed by proteus, the microcontrollers have been programmed by micro C, and the Graphical User Interface (GUI) has been implemented in Java. …”
Get full text
Get full text
Thesis -
2
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
Get full text
Get full text
Get full text
Article -
3
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
Get full text
Get full text
Get full text
Thesis -
4
Classification of credit card holder behavior using K Nearest Neighbor algorithm / Ahmad Faris Rahimi
Published 2017“…In the implementation phase, Bubble Sort, Euclidean Distance, 10-Fold Cross validation, and K Nearest Neighbor algorithm are developed. …”
Get full text
Get full text
Thesis -
5
Text Extraction Algorithm for Web Text Classification
Published 2010“…This study provides a text extraction algorithm for web text classification. …”
Get full text
Get full text
Get full text
Thesis -
6
Effects of user selected conditions on modeling of dynamic systems using adaptive fuzzy model
Published 2001“…The implementation and the computational aspects of the training algorithm are also highlighted. Three examples of discrete-time nonlinear systems are used in the simulation study to show the effects of user selected conditions on the identification process. …”
Get full text
Get full text
Get full text
Article -
7
Influence maximisation towards target users on social networks for information diffusion
Published 2018“…Influence maximisation has been an area of active research in recent years.This study aims to extend the fundamental influence maximisation problem (IMP) with respect to a set of target users on a social network.It is important to aim at the target users to speed up the rate of information diffusion and reduce the information diffusion cost.In doing so, the MITU algorithm was formulated and compared with state of the art algorithms.Publicly available datasets were used in validating the proposed algorithm.It was found that the MITU identified all target nodes while significantly lowering the information diffusion cost function (IDCF) by up to 79%.The influence overlap problem was equally identified in the heuristic algorithm where the seed set size was reduced by an average of six times.Furthermore, the random influencer selection identifies target nodes better than the betweenness and PageRank centralities.The findings could help organisations to reach target users on social media in the shortest cycle.…”
Get full text
Get full text
Get full text
Article -
8
Influence maximization towards target users on social networks for information diffusion
Published 2018“…In doing so, the MITU algorithm was formulated and compared with state of the art algorithms. …”
Get full text
Get full text
Get full text
Article -
9
User interface and interactivity design guidelines of algorithm visualization on mobile platform
Published 2019“…In terms of artifact, this study yields AVOMP design guidelines that are comprised of UI design and interactivity aspects as well as AVOMP prototype of sorting algorithms. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
10
A graphical user interface application for continuous-time identification of dynamical system
Published 2002“…A validation process had been implemented using cross validation process. …”
Get full text
Get full text
Get full text
Article -
11
Deep Learning-Driven Mobility And Utility-Based Resource Management In Mm-Wave Enable Ultradense Heterogeneous Networks
Published 2025thesis::doctoral thesis -
12
Development of web-based GIS for traffic management system with obstacle avoidance technique using open source software
Published 2014“…In order to calculate the shortest path between two nodes, Dijkstra algorithm was utilized. Obstacle avoidance technique was implemented in this algorithm to avoid the congested areas. …”
Get full text
Get full text
Thesis -
13
Interactive framework for dynamic modelling and active vibration control of flexible structures
Published 2008“…This paper presents the implementation of an interactive learning environment for dynamic simulation and active vibration control of flexible structures. The study attempts to facilitate the learning process of the subject area through the development of an interactive environment that can help users to simulate and visualise the behaviour of flexible structures with given physical characteristics, and to test and validate controller designs. …”
Get full text
Get full text
Article -
14
A pilot study on the validation of vis-screen mobile application for vision test
Published 2020“…This pilot study revealed the application is highly potential to be a valid and reliable tool for vision screening in the community.…”
Get full text
Get full text
Article -
15
Trend analysis of software engineering scientific publications
Published 2019“…The estimation of the future trend is done by development of the algorithm linear regression algorithm in Matlab. With data collected from the main Science Direct database with of Software Engineering keywords, validation of the proposed algorithms on the case study was done. …”
Get full text
Get full text
Get full text
Undergraduates Project Papers -
16
Energy-efficient power allocation for downlink non orthogonal multiple access networks based on game theory and genetic algorithm / Reem Mustafa Mah’d Al Debes
Published 2025“…Additionally, it reduces outage probability by 25% and 10% relative to OMA and existing NOMA algorithms, respectively. These results validate the algorithm's robustness, particularly under imperfect CSI conditions, where traditional methods often fail. …”
Get full text
Get full text
Get full text
Thesis -
17
ChoCD : Usable and secure graphical password authentication scheme
Published 2024thesis::master thesis -
18
Comparative analysis of sine cosine and social network search-based algorithm for software test redundancy reduction optimization
Published 2024“…It involves evaluating a software application or system from the user's perspective to validate its operation, usability, and compliance with real-world scenarios. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
19
Development and validation of promoter prediction system for recombinant lipase expression in Pichia pastoris
Published 2017“…A user interface was provided for LipExPS. ARM lipase was used to validate the LipExPS. …”
Get full text
Get full text
Thesis -
20
New Lightweight Identity Based Encryption Algorithm for Mobile Device: Preliminary Study
Published 2012“…The main problem in traditional cryptosystem is a public key in determining validity, but this problem can be solved by identity based cryptography, where the public key can be obtained from users of public information known users. …”
Get full text
Get full text
Conference or Workshop Item
