Search Results - (( java implementation tree algorithm ) OR ( using chapter using algorithm ))
Search alternatives:
- java implementation »
- implementation tree »
- using algorithm »
- tree algorithm »
- using chapter »
- chapter using »
-
1
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
Get full text
Get full text
Get full text
Article -
2
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
Get full text
Get full text
Get full text
Thesis -
3
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…This study proposes a car parking management system which applies Dijkstra’s algorithm, Ant Colony Optimization (ACO) and Binary Search Tree (BST) in structuring a guidance system for indoor parking. …”
Get full text
Get full text
Thesis -
4
Implementation of perez-dumortier calibration algorithm
Published 2014“…The governing theory of the algorithm was discussed in the previous chapter. This chapter presents information on how to implement the Perez-Dumotier calibration algorithm using actual field measurement. …”
Get full text
Get full text
Get full text
Chapter In Book -
5
IIUM car sticker recognition using phase based template matching algorithm
Published 2011Get full text
Get full text
Get full text
Book Chapter -
6
Assembly sequence optimization using the bees algorithm
Published 2022Get full text
Get full text
Get full text
Get full text
Book Chapter -
7
Block based motion vector estimation using fuhs16 uhds16 and uhds8 algorithms for video sequence
Published 2011“…In addition, the mentioned block-matching algorithms are the baseline techniques that have been used to further develop all the enhanced or improved algorithms. …”
Get full text
Get full text
Get full text
Book Chapter -
8
Research Book - data engineering and information security series 1
Published 2017“…Chapter 3 proposes a new hybrid evolutionary algorithm for plant forecasting using fuzzy inference system. …”
Get full text
Get full text
Book -
9
Automatic timetabling for Malaysian secondary school using genetic algorithm / Ku Shin Soon
Published 2006“…Solving timetable problem using genetic algorithms was the recent approach applies by the researchers. …”
Get full text
Get full text
Thesis -
10
-
11
Enhancement of RSA Key Generation Using Identity
Published 2015Get full text
Get full text
Get full text
Book Chapter -
12
OPTIMIZATION OF PID CONTROLLER PARAMETERS USING ARTIFICIAL FISH SWARM ALGORITHM
Published 2013“…This Final Year Project is preceded on the topic named “The Optimization of PID Control Parameters Using Artificial Fish Swarm Algorithm”. The background of the topic is presented in the Introduction chapter that describes on PID controllers. …”
Get full text
Get full text
Final Year Project -
13
-
14
The use of genetic algorithm in improving medical image segmentation techniques
Published 2011Get full text
Get full text
Book Chapter -
15
-
16
Optimal design of step – cone pulley problem using the bees algorithm
Published 2021Get full text
Get full text
Get full text
Get full text
Book Chapter -
17
SINE COSINE ALGORITHM BASED NEURAL NETWORK FOR RAINFALL DATA IMPUTATION
Published 2024“…The Sine Cosine Algorithm (SCA) is a relatively recent metaheuristic algorithm, drawing inspiration from the characteristics of trigonometric sine and cosine functions. …”
Get full text
Get full text
Get full text
Book Chapter -
18
The use of genetic algorithm in autonomous robot navigation
Published 2011Get full text
Get full text
Get full text
Book Chapter -
19
System identification technique for a helicopter using genetic algorithms
Published 2011Get full text
Get full text
Get full text
Book Chapter -
20
Face verification : an introduction
Published 2011“…Face is an essential application used in authentication. In this chapter, a brief background about automated face recognition is given then a short review about face recognition algorithms. …”
Get full text
Get full text
Get full text
Book Chapter
