Search Results - (( java implementation tree algorithm ) OR ( using building process algorithm ))

Refine Results
  1. 1

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde by Ogunfolajin Maruff , Tunde

    Published 2022
    “…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization by Mohammad Ata, Karimeh Ibrahim

    Published 2019
    “…This study proposes a car parking management system which applies Dijkstra’s algorithm, Ant Colony Optimization (ACO) and Binary Search Tree (BST) in structuring a guidance system for indoor parking. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Clock Distribution Network Building Algorithm For Multiple Ips In System On A Chip by Tan , Tze Liang

    Published 2017
    “…Finally, the global CDN build using the algorithm is evaluated based on the time needed to build the global CDN and the clock buffer numbers and areas used. …”
    Get full text
    Get full text
    Thesis
  5. 5

    High Rise Building Evacuation Route Model Using DIJKSTRA'S Algorithm by Mohd Sabri, Nor Amalina

    Published 2015
    “…This research aims to assist the evacuees to find the shortest path in a high rise building using a shortest path algorithm. The objective is to design and develop an evacuation route using shortest path algorithm based on the evacuation map of the building. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Assessment of CDA and Morphlink-C Algorithms method in crack detection using [Multirotor DJ1 phantom 3] image / Muhammad Hafizi Abd Rahaim by Abd Rahaim, Muhammad Hafizi

    Published 2018
    “…These data model then was evaluated their availability of processed image to detect crack using CDA and MorphLink-C algorithms. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Stereolithography 3D printing development of 3D printing machine controller using the predefined closest-distance volume interpolator system by -, -

    Published 2019
    “…The proposed slicing algorithm uses line-plane intersection model to generate arbitrary line segment when it receives an STL facet. …”
    Get full text
    Get full text
    Research Report
  8. 8

    Consumption-Based Priority Algorithm for Energy Consumption by Ahsan, Matiullah, Zainal, Zainab, Baharom, Md Nor Ramdon, Khalil, Ihsan Ullah, Mohd Ariffin, Azrul, Mohd Jamil, Nor Akmal, Ullah, Irshad, Mehmod, Luqman Hakim, Mohd Yousaf, Mohd Fairouz

    Published 2024
    “…According to recent research, buildings may reduce their energy use by up to 30% via improved operations, which are often based on effective energy management using the load priority algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Consumption-Based Priority Algorithm for Energy Consumption by Ahsan, Matiullah, Zainal, Zainab, Baharom, Md Nor Ramdon, Khalil, Ihsan Ullah, Mohd Ariffin, Azrul, Mohd Jamil, Nor Akmal, Ullah, Irshad, Mehmod, Luqman Hakim, Mohd Yousaf, Mohd Fairouz

    Published 2024
    “…According to recent research, buildings may reduce their energy use by up to 30% via improved operations, which are often based on effective energy management using the load priority algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Contour generation for mask projection stereolithography 3D printing by Faeiz Azizi, Adnan

    Published 2019
    “…The proposed slicing algorithm uses line-plane intersection model to generate arbitrary line segment when it receives an STL facet. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Modelling Autonomous Evacuation Navigation System (AENS) for optimal route using Dijkstra's algorithm by Abu Samah, Khyrina Airin Fariza

    Published 2016
    “…Through ST adaptation, all subsystems were integrated and using the “Dijkstra’s algorithm” (DA) by modifying its function from shortest path algorithm to safest and shortest algorithm, to the nearest exit. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    Consumption-Based Priority Algorithm for Energy Consumption by Ahsan M., Zainal Z., Baharom M.N.R., Khalil I.U., Ariffin A.M., Jamil N.A.M., Ullah I., Mehmod L.H., Yousaf M.F.M.

    Published 2025
    “…According to recent research, buildings may reduce their energy use by up to 30% via improved operations, which are often based on effective energy management using the load priority algorithm. …”
    Article
  13. 13

    Development of Machine Learning Algorithm for Acquiring Machining Data in Turning Process by Ali Al-Assadi, Hayder M. A.

    Published 2004
    “…An Intelligent Learning System for the turning process was developed. Visual C++ object-oriented programming language was used to build the Intelligent Learning System for Turning. …”
    Get full text
    Get full text
    Thesis
  14. 14

    SURE-Autometrics algorithm for model selection in multiple equations by Norhayati, Yusof

    Published 2016
    “…Meanwhile, practitioners who are usually non-experts and lack of statistical knowledge will face difficulties during the modelling process. Hence, algorithm with a step by step guidance is beneficial in model building, testing and selection. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Information retrieval system (IRS) process on Hansard document / Suraya Saad by Saad, Suraya

    Published 2007
    “…The algorithm will be developed to split the document into few subdocuments by using keywords. …”
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17

    Cryptanalysis in cryptographic algorithm design by Z'aba, Muhammad Reza, Ahmad, Badrisham, Ibrahim, Subariah, Maarof, Mohd. Aizaini

    Published 2006
    “…It also helps the cryptography community in building more secure algorithms.…”
    Get full text
    Conference or Workshop Item
  18. 18

    Sistem navigasi berasaskan algoritma Dijkstra di dalam persekitaran tiga dimensi by Ujang, Muhamad Uznir

    Published 2008
    “…Dijkstra's algorithm is one of the algorithms that could be used in network analysis process especially for 2D shortest route data. …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    Securing cloud data system (SCDS) for key exposure using AES algorithm by Thabet Albatol, Mohammed Samer Hasan

    Published 2021
    “…After that we use to build securing cloud data system (SCDS) for key exposure using the AES algorithm for encrypting and decrypting our website cloud data and files. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20