Search Results - (( java implementation tree algorithm ) OR ( using process new algorithm ))

Refine Results
  1. 1

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde by Ogunfolajin Maruff , Tunde

    Published 2022
    “…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization by Mohammad Ata, Karimeh Ibrahim

    Published 2019
    “…This study proposes a car parking management system which applies Dijkstra’s algorithm, Ant Colony Optimization (ACO) and Binary Search Tree (BST) in structuring a guidance system for indoor parking. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Priority and dynamic quantum time algorithms for central processing unit scheduling by Mohammed, Maysoon A.

    Published 2018
    “…Central Processing Unit is scheduled using different types of scheduling algorithms. …”
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6

    Enhancement of stemming process for malay illicit web content by Noor Fatihah , Mazlam

    Published 2012
    “…As conclusion, the implementation of new features in enhanced stemming algorithm can reduce the errors produce in Sembok’s stemming algorithm. …”
    Get full text
    Get full text
    Thesis
  7. 7

    New Cryptographic Algorithms for Enhancing Security of Voice Data by Al-Hazaimeh, Obaida Mohammad Awad

    Published 2010
    “…In this research, a new keys is generated in a random fashion and then used to encrypt each new voice packet to strengthen the security level. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    New completion time algorithms for sequence based scheduling in multiproduct batch processes using matrix by Shafeeq , A., M.I., Abdul Mutalib, Amminudin , K.A., Muhammad , A.

    Published 2008
    “…The current work proposes new completion time algorithms for multiproduct batch process with two commonly used transfer policies namely zero wait (ZW) and no intermediate storage (NIS). …”
    Get full text
    Get full text
    Article
  9. 9
  10. 10

    Widely linear dynamic quaternion valued least mean square algorithm for linear filtering by Mohammed, Aldulaimi Haydar Imad

    Published 2017
    “…The new adaptive algorithm is called dynamic quaternion least mean square algorithm (DQLMS) because of the normalization process of the filter input and the variable step-size. …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    A New And Fast Rival Genetic Algorithm For Feature Selection by Too, Jing Wei, Abdullah, Abdul Rahim

    Published 2021
    “…Therefore, we propose a new rival genetic algorithm, as well as a fast version of rival genetic algorithm, to enhance the performance of GA in feature selection. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Fast zerox algorithm for routing in optical multistage interconnection networks. by T.D. , Shahida, Othman, Mohamed, Abdullah, M. Khazani

    Published 2010
    “…It is shown that using the new iCM, the original ZeroX algorithm is simplified, thus improved the algorithm by reducing the time to complete routing process. …”
    Get full text
    Get full text
    Article
  13. 13

    Adaptive interference canceller using analog algorithm with offset voltage by Mohammed, Alaa Hadi

    Published 2015
    “…LMS and NLMS algorithms have been used in a wide range of signal processing applications because of their simplicity in computations compared to the RLS algorithm. …”
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15

    A new vertical edge detection algorithm and its application by Al-Ghaili, Abbas Mohammed Ali, Mashohor, Syamsiah, Ismail, Alyani, Ramli, Abdul Rahman

    Published 2008
    “…We proposed a new and fast vertical edge detection algorithm (VEDA) which is based on the contrast between the gray scale values. …”
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    Improving resource management with multi-instance broker scheduling algorithm in hierarchical grid computing by Yahaya, Bakri

    Published 2016
    “…Overall, the final results showed that the new designed algorithm (i.e., MiBSA algorithm) has successfully improved grid processing performance and successfully surpassed the performance of previous algorithm.…”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    Implementation of local proprietary symmetric and asymmetric algorithm as secure plug-in on microsoft outlook / Mohd Izhar Jaafar by Jaafar, Mohd Izhar

    Published 2012
    “…The purpose of this study was to design and develop new secure plug-in on Microsoft Outlook using integration of symmetric and asymmetric cryptographic algorithm. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Mapreduce algorithm for weather dataset by Khalid Adam, Ismail Hammad

    Published 2017
    “…Next, MapReduce Algorithm is developed using Java programming. The algorithm is tested using small and big dataset. …”
    Get full text
    Get full text
    Thesis
  19. 19

    E4ML: Educational Tool for Machine Learning by Sainin, Mohd Shamrie, Siraj, Fadzilah

    Published 2003
    “…There are various types of machine learning algorithms with certain processes taken by the algorithm.In teaching of the machine learning algorithms, such processes need to be explained especially to the beginner in introductory level.This paper discusses the development the tool that addresses the process by certain algorithm to produce a hypothesis or output based on given data.This tool can also be used in teaching and learning purposes.The explanation of processes by the algorithms is demonstrated through simple simulation.The source of the algorithms was adapted from Mitchell book [1] that cover popular algorithms in machine learning for teaching and learning such as Concept Learning, Decision Tree, Bayesian Learning, Neural Networks, and Instance based Learning.The tool also used several classes of Weka (Waikato Environment for Knowledge Analysis) as a basis for the design and implementation of the new tool that focuses on explaining the processes taken by certain algorithm.…”
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20

    A new corner detection algorithm for chain code representation. by Haron , Habibollah, Shamsuddin , Siti Mariyam, Mohamed, Dzulkifli

    Published 2005
    “…A new algorithm is proposed to detect a corner of a thinned binary image that is represented by an eight-connected contour chain code. …”
    Get full text
    Get full text
    Article