Search Results - (( java implementation tree algorithm ) OR ( using code ((mead algorithm) OR (mining algorithm)) ))

  • Showing 1 - 18 results of 18
Refine Results
  1. 1

    Electricity demand forecasting in Turkey and Indonesia using linear and nonlinear models based on real-value genetic algorithm and extended Nelder-Mead local search by Wahab, Musa

    Published 2014
    “…Results of the proposed model were compared to the hybrid GA and Nelder-Mead local search, Real Code Genetic Algorithm and Particle Swarm Optimisation. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    Hybrid Real-Value-Genetic-Algorithm and Extended-Nelder- Mead Algorithm for Short Term Energy Demand Prediction by Musa, Wahab, Ku Mahamud, Ku Ruhana, Salim, Sardi, Sediyono, Agung

    Published 2024
    “…This study proposes a hybrid prediction algorithm which comprises the RVGA and the extended-Nelder-Mead (ENM) algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  3. 3
  4. 4

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde by Ogunfolajin Maruff , Tunde

    Published 2022
    “…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Evaluations of oil palm fresh fruit bunches maturity degree using multiband spectrometer by Tuerxun, Adilijiang

    Published 2017
    “…Furthermore, the Lazy-IBK algorithm have been validated to produce the best classifier model, with the machine learning algorithm performance of 65.26%, recall of 65.3%, and 65.4% F-measured as compared to other evaluated machine learning classifier algorithms proposed within the WEKA data mining algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization by Mohammad Ata, Karimeh Ibrahim

    Published 2019
    “…This study proposes a car parking management system which applies Dijkstra’s algorithm, Ant Colony Optimization (ACO) and Binary Search Tree (BST) in structuring a guidance system for indoor parking. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Image clustering comparison of two color segmentation techniques by Subramaniam, Kavitha Pichaiyan

    Published 2010
    “…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10

    Comparative analysis for topic classification in juz Al-Baqarah by Rahman, Mohamad Izzuddin, Samsudin, Noor Azah, Mustapha, Aida, Abdullahi Oyekunle, Adeleke

    Published 2018
    “…This research project is aiming to create computing environment that enable us use to text mining the Quran. The classification experiment is using the Support Vector Machine to find themes in Juz‟ Baqarah. …”
    Get full text
    Get full text
    Article
  11. 11
  12. 12

    Improved Malware detection model with Apriori Association rule and particle swarm optimization by Adebayo, Olawale Surajudeen, Abdul Aziz, Normaziah

    Published 2019
    “…In this method, the candidate detectors generated by particle swarm optimization form rules using apriori association rule. These rule models are used together with extraction algorithm to classify and detect malicious android application. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    The future of money: cryptocurrency is the way to go in Malaysia / Dr. Zuraidah Mohamed Isa, Dr. Dahlia Ibrahim and Dr. Mohamad Hanif Abu Hassan by Mohamed Isa, Zuraidah, Ibrahim, Dahlia, Abu Hassan, Mohamad Hanif

    Published 2022
    “…Cryptocurrency is a system that uses computers to mine it, where mining requires the solution of several mathematical algorithms. …”
    Get full text
    Get full text
    Book Section
  14. 14

    Learner’s emotion prediction using production rules classification algorithm through brain computer interface tool by Nurshafiqa Saffah, Mohd Sharif

    Published 2018
    “…From the data analysis using WEKA software, the production rules classifier (PART) is found to be the most accurate classification algorithm in classifying the emotion which yields the highest precision percentage of 99.6% compared to J48 (99.5%) and Naïve Bayes (96.2%). …”
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16

    A COMPARISON STUDY OF DATA CLUSTERING AND VISUALISATION TECHNIQUES WITH VARIOUS DATA TYPES by Ling, Chien

    Published 2020
    “…This study only focuses on three types of clustering techniques which are k-means clustering, agglomerative hierarchical clustering with the ward’s linkage, complete linkage, and average linkage, and Self-Organizing Map (SOM). The clustering algorithms are written using Python language by modifying the coding obtained from the Internet. …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  17. 17

    An enhanced android botnet detection approach using feature refinement by Anwar, Shahid

    Published 2019
    “…As a result, Android botnet can be used to initiate various distributed coordinated attacks including spam emails, click frauds, bitcoins mining, distributed denial of service attacks disseminating other malware and much more. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Feature extraction from natural language to aid requirements reuse in software product lines engineering / Noor Hasrina Bakar by Noor Hasrina, Bakar

    Published 2016
    “…In phase 3, Latent Semantic Analysis (LSA) and tfidf term weighting are used in order to determine document relatedness. …”
    Get full text
    Get full text
    Thesis