Search Results - (( java implementation tree algorithm ) OR ( using interacted efficient algorithm ))

Refine Results
  1. 1

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde by Ogunfolajin Maruff , Tunde

    Published 2022
    “…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    Efficient prime-based method for interactive mining of frequent patterns. by Mohammad Hossein, Nadimi Shahraki, Mustapha, Norwati, Sulaiman, Md. Nasir, Mamat, Ali

    Published 2011
    “…Recently, a few efficient interactive mining algorithms have been proposed, which are able to capture the content of transaction database to eliminate possibility of the database rescanning. …”
    Get full text
    Get full text
    Article
  4. 4
  5. 5

    Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization by Mohammad Ata, Karimeh Ibrahim

    Published 2019
    “…This study proposes a car parking management system which applies Dijkstra’s algorithm, Ant Colony Optimization (ACO) and Binary Search Tree (BST) in structuring a guidance system for indoor parking. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Fast and efficient sequential learning algorithms using direct-link RBF networks by Asirvadam , Vijanth Sagayan, McLoone, Sean, Irwin, George

    Published 2003
    “…The dynamic DRBF network is trained using the recently proposed decomposed/parallel recursive Levenberg Marquardt (PRLM) algorithm by neglecting the interneuron weight interactions. …”
    Get full text
    Get full text
    Book Section
  7. 7

    Adapting the Elitism on the Greedy Algorithm for Variable Strength Combinatorial Test Cases Generation by Bahomaid, Ameen A., Alsewari, Abdulrahman A., Zamli, Kamal Z., Alsariera, Yazan A.

    Published 2018
    “…This study presented the most recent variable interaction strength (VS) CT strategy using an enhanced variant in the greedy algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Simultaneous Adaptation Of Multiple Genetic Algorithm Parameters Using Fuzzy Logic Controllers by Ghallab, Abdullatif Saleh Nasser

    Published 2010
    “…Fuzzy Adaptive Genetic Algorithm techniques have been used recently for parameter control,…”
    Get full text
    Get full text
    Thesis
  9. 9

    Prime-based method for interactive mining of frequent patterns by Nadimi-Shahraki, Mohammad-Hossein

    Published 2010
    “…Thus far, a few efficient interactive mining algorithms have been proposed. …”
    Get full text
    Get full text
    Thesis
  10. 10

    VISUALIZATION OF GENETIC ALGORITHM BASED ON 2-D GRAPH TO ACCELERATE THE SEARCHING WITH HUMAN INTERVENTIONS. by FAROOQ, HUMERA

    Published 2012
    “…A tool termed as VIGA-20 (Visualization of Genetic Algorithm using 2-0 Graph) is implemented to accomplish this goal. …”
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12
  13. 13

    A real-time vision-based touchless interaction of virtual heart using integration of motion gesture interaction methods by Ng, Ing Kye

    Published 2014
    “…In this study, a prototype of Augmented Reality system that implements gesture motion is developed. The use of the gesture motion algorithm enables an interactive environment in medical imaging.…”
    Get full text
    Get full text
    Academic Exercise
  14. 14

    Input-output based relation combinatorial testing using whale optimization algorithm for generating near optimum number of test suite by Suali, Anjila J., Nuraminah Ramli, Rozmie Razif Othman, Hasneeza Liza Zakaria, Iszaidy Ismail, Nor Shahida Mohd Jamail, Rimuljo Hendradi, Nurol Husna Che Rose

    Published 2025
    “…Given the impracticality of testing every possible interaction due to time, budget, and resource constraints, combinatorial testing, which is t-way testing, is adopted to cover parameter interactions efficiently. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    African buffalo optimization algorithm based t-way test suite generation strategy for electronic-payment transactions by B. Odili, Julius, B. Nasser, Abdullah, A., Noraziah, Abd Wahab, Mohd Helmy, Ahmed, Mashuk

    Published 2022
    “…The use of meta-heuristics in Combinatorial Interaction Testing (CIT) is becoming more and more popular due to their effectiveness and efficiency over the traditional methods especially in authenticating electronic payment (e�payment) transactions. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    Sequence and sequence-less t-way test suite generation strategy based on the elitist flower pollination algorithm by Mohammed Abdullah, Abdullah Nasser

    Published 2018
    “…Although useful, all aforementioned t-way strategies have assumed sequence-less interactions amongst input parameters. …”
    Get full text
    Get full text
    Thesis
  17. 17

    AGENT MEETING SCHEDULER by ZAINAL ABIDIN, NURAINI

    Published 2011
    “…An agent meeting scheduler prototype then will be developed to prove that the selected algorithm is working properly. Qualitative research method is being used to gather necessary data on agent algorithm and this data will be used to select the suitable algorithm. …”
    Get full text
    Get full text
    Final Year Project
  18. 18

    Enhance efficiency of answering XML keyword query using incompact structure of MCCTree by Sazaly, Ummu Sulaim

    Published 2012
    “…If the result cannot be used directly by the ranking method, the algorithm has an ineffective process. …”
    Get full text
    Get full text
    Thesis
  19. 19

    An augmented reality real-time cloud-based remote monitoring algorithm for a manufacturing system / Siti Aisyah Jaafar by Jaafar, Siti Aisyah

    Published 2021
    “…Thus, resulting in the efficiency of the novel AR-IoT remote monitoring algorithm. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Tracking of dynamic arm motion estimation and interaction with fuzzy control by Badi, Haitham, Hamza, Alaa, Mohd Yunus, Mohd Amin

    Published 2016
    “…For robustly tracking the users arm position, an arm motion estimation method is designed based on the fuzzy predictive control fuzzy Mamdani algorithm theory. To verify the efficiency and accuracy of the pro- posed method, we use a Kalman filter algorithm to test stabilize the output.…”
    Get full text
    Get full text
    Article