Search Results - (( java implementation tree algorithm ) OR ( using a utilizing algorithm ))
Search alternatives:
- java implementation »
- implementation tree »
- tree algorithm »
- a utilizing »
- using a »
-
1
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
Get full text
Get full text
Get full text
Article -
2
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
Get full text
Get full text
Get full text
Thesis -
3
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…This study proposes a car parking management system which applies Dijkstra’s algorithm, Ant Colony Optimization (ACO) and Binary Search Tree (BST) in structuring a guidance system for indoor parking. …”
Get full text
Get full text
Thesis -
4
Enhanced utility accrual scheduling algorithms for adaptive real time system.
Published 2009“…We compared the performances of these algorithms by using discrete event simulation. Results: The proposed PUAS algorithm achieved the highest accrued utility for the entire load range. …”
Get full text
Article -
5
A backward recovery mechanism in preemptive utility accrual real time scheduling algorithm
Published 2010“…Problem statement: This study proposed a robust algorithm named as Backward Recovery Preemptive Utility Accrual Scheduling (BRPUAS) algorithm that implements the Backward Recovery(BR) mechanism as a fault recovery solution under the existing utility accrual scheduling environment. …”
Get full text
Get full text
Article -
6
A Non-preemptive Utility Accrual Scheduling Algorithm in iAdaptive Real Time System
Published 2008“…In this paper, we proposed a Non-preemptive Utility Accrual Scheduling (or NUAS) algorithm that enhanced the existing General Utility Scheduling (or GUS) proposed by Peng Li [1]. …”
Get full text
Get full text
Article -
7
A preemptive utility accrual scheduling algorithm in adaptive real time system.
Published 2008“…In this paper, we propose a preemptive utility accrual scheduling(or PUAS) algorithm as an enhancement to General Utility Scheduling ( or GUS) algorithm proposed by Peng Li [1]. …”
Get full text
Get full text
Article -
8
Improving utility accrual scheduling algorithm for adaptive real-time system
Published 2008“…In this paper, we proposed a preemptive utility accrual scheduling (or PUAS) algorithm to further extend the functionalities of General Utility Scheduling (or GUS) algorithm proposed by Peng Li [1]. …”
Get full text
Get full text
Conference or Workshop Item -
9
Improving utility and recovery algorithms for adaptive real time system in multiprocessor environment
Published 2012“…These algorithms solved the abortion problem in the existing General Utility Scheduling (GUS). …”
Get full text
Get full text
Thesis -
10
On the delay and link utilization with the new-additive increase multiplicative decrease congestion avoidance and control algorithm
Published 2010“…We want to evaluate the effect of using the AIMD algorithm after developing it, which we called the New-AIMD algorithm, to find a new approach to measure the end-to-end delay and bottleneck link utilization and use the NCTUns simulator to obtain the results after making the modification for the mechanism. …”
Get full text
Get full text
Get full text
Article -
11
Utilizing artificial bee colony algorithm as feature selection method in Arabic text classification
Published 2023“…Support Vector Machine and Naïve Bayes classifiers were used as a fitness function for the ABC algorithm. …”
Get full text
Get full text
Get full text
Get full text
Article -
12
Experimental evaluation of bottleneck link utilization with new-additive increase multiplicative decrease congestion avoidance and control algorithm.
Published 2009“…And also all the developments for the congestion control and avoidance algorithms interest about the using of network resources and use the links capacity (utilization). …”
Get full text
Get full text
Article -
13
Scheduling scientific workflow using multiobjective algorithm with fuzzy resource utilization in multi-cloud environment
Published 2020“…The provision of resources and services for scientific workflow applications using a multi-cloud architecture and a pay-per-use rule has recently gained popularity within the cloud computing research domain. …”
Get full text
Get full text
Article -
14
Energy utilized hybrid flowshop scheduling using Multi-Objective Tiki Taka Algorithm (MOTTA)
Published 2025“…The algorithm is compared against five state-of-the-art algorithms MOGWO, MOAOS, MOGOA, MAOA, and MALO-using 12 Carlier Neron benchmark problems. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
15
Hybrid flow shop scheduling problem with energy utilization using non-dominated sorting genetic algorithm-III (NSGA-III) optimization
Published 2023“…This paper presents the existing multi-objective approach for solving energy utilization and makespan problems in HFS scheduling using Non-Dominated Sorting Genetic Algorithm-III (NSGA-III), and a comparison to other optimization models was subjected for analysis. …”
Get full text
Get full text
Get full text
Article -
16
Utility-based non-cooperative power control game in wireless environment / Yousef Ali Mohammed Al-Gumaei
Published 2017“…Numerical simulations are used to prove the effectiveness of these algorithms compared with other existing power control algorithms. …”
Get full text
Get full text
Get full text
Thesis -
17
Detecting resource consumption attack over MANET using an artificial immune algorithm
Published 2011“…This paper’s objective is to utilize the biological model used in the dendritic cell algorithm (DCA) to introduce a Dendritic Cell Inspired Intrusion Detection Algorithm (DCIIDA). …”
Get full text
Get full text
Get full text
Article -
18
Document clustering for knowledge discovery using nature-inspired algorithm
Published 2014Get full text
Get full text
Get full text
Conference or Workshop Item -
19
Sentiment mining using immune network algorithm /Raja Muhammad Hafiz Raja Kamarudin
Published 2012“…However, this is a step stone towards developing a biological-inspired Sentiment Mining algorithm…”
Get full text
Get full text
Thesis -
20
Development of self-learning algorithm for autonomous system utilizing reinforcement learning and unsupervised weightless neural network / Yusman Yusof
Published 2019“…In the algorithm development a step-by-step example of the algorithm implementation is presented and then successfully implemented in Lego Mindstorm obstacle avoiding mobile robot as a proof of concept implementation of the hybrid AI algorithm. …”
Get full text
Get full text
Thesis
