Search Results - (( java implementation tree algorithm ) OR ( using constructs trust algorithm ))

  • Showing 1 - 9 results of 9
Refine Results
  1. 1

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde by Ogunfolajin Maruff , Tunde

    Published 2022
    “…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    Does organizational culture matter in the relationship between trust and SMEs performance by Gorondutse, Abdullahi Hassan, Abdullah, Haim Hilman

    Published 2018
    “…Findings – The research findings were established using SmartPLS Algorithm and bootstrapping functions. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization by Mohammad Ata, Karimeh Ibrahim

    Published 2019
    “…This study proposes a car parking management system which applies Dijkstra’s algorithm, Ant Colony Optimization (ACO) and Binary Search Tree (BST) in structuring a guidance system for indoor parking. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Effect of business social responsibility (BSR) on performance of SMEs in Nigeria by Gorondutse, Abdulahi Hassan

    Published 2014
    “…This study used purposive sampling for sample selection. Partial Least Squares (PLS) algorithm and bootstrap techniques were used to test the study‘s hypotheses. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Modified quasi-Newton type methods using gradient flow system for solving unconstrained optimization by Yap, Chui Ying

    Published 2016
    “…We investigate the possible use of control theory, particularly theory on gradient ow system to derive some modified line search and trust region methods for optimization. …”
    Get full text
    Get full text
    Thesis
  7. 7

    An enhanced cluster head selection algorithm for routing in mobile AD-HOC network by Abdulsaheb, Ghaida Muttasher

    Published 2017
    “…This thesis proposes an algorithm for increasing the stability of the cluster by selecting the most stable cluster head, maintaining the cluster structure with minimum maintenance overhead, and finding the best performance routing algorithm for use over MANET. …”
    Get full text
    Get full text
    Thesis
  8. 8

    FACTORS INFLUENCING THE INTENTION TO ADOPT E-WALLET: A REGIONAL DISTRIBUTION PERSPECTIVE IN MALAYSIA by Liew, Vernon, Poh, Phaik See

    Published 2022
    “…Based on parameters of two tailed test with confidence interval of 95% (significance level 0.05), a total of 400 responses were analysed via SmartPLS with PLS-SEM algorithm. Knowledge, perceived ease of use, perceived usefulness, and the mediating effect of perceived trust on knowledge were found significant. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Enhancement of Security Architecture for Smartcard Based Authentication Protocols by Mohammed, Lawan Ahmed

    Published 2004
    “…The general approach uses trusted devices (specifically smartcards) to provide an area of secure processing and storage. …”
    Get full text
    Get full text
    Thesis