Search Results - (( java implementation tree algorithm ) OR ( using same based algorithm ))
Search alternatives:
- java implementation »
- implementation tree »
- tree algorithm »
- using same »
- same based »
-
1
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
Get full text
Get full text
Get full text
Article -
2
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
Get full text
Get full text
Get full text
Thesis -
3
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…This study proposes a car parking management system which applies Dijkstra’s algorithm, Ant Colony Optimization (ACO) and Binary Search Tree (BST) in structuring a guidance system for indoor parking. …”
Get full text
Get full text
Thesis -
4
JPEG Image Encryption Using Combined Reversed And Normal Direction-Distorted Dc Permutation With Key Scheduling Algorithm-Based Permutation
Published 2008“…The proposed approach uses a frequency domain combinational framework of coefficients scrambling with Key Scheduling Algorithm based (KSA-based) permutation. …”
Get full text
Get full text
Thesis -
5
USING LATENT SEMANTIC INDEXING FOR DOCUMENT CLUSTERING
Published 2010“…Document clustering is an implementation of data mining task. By using similarity measurement of documents‟ characteristic, they can be clustered based on the same category or topic. …”
Get full text
Get full text
Thesis -
6
Incorporating stemming algorithm in the Malay information retrieval that employs Thesaurus aproach / Mohd Rosmadi Mokhtar
Published 2001“…One of well-known conflation methods is stemming algorithms, where it is used to identify morphological variants. …”
Get full text
Get full text
Thesis -
7
Energy-efficient two-stage chain protocol routing algorithm for wireless sensor networks
Published 2014“…The new TSCP routing algorithm is compared with other similar grid-based routing algorithms namely Chain-Cluster based Mixed routing (CCM) and Chain-Chain Based Routing Protocol (CCBRP). …”
Get full text
Get full text
Thesis -
8
-
9
Noise Cancellation using Selectable Adaptive Algorithm for Speech in Variable Noise Environment
Published 2017“…Some of the teething problems associated in the use of two-sensor noise cancellation systems are the nature of the noise signals—a problem that imposes the use of highly complex algorithms in reducing the noise. …”
Get full text
Get full text
Get full text
Article -
10
Minimization of Test Cases and Fault Detection Effectiveness Improvement through Modified Reduction with Selective Redundancy Algorithm
Published 2007“…Then the algorithm gathers all the test cases based on the definition occurrence and def-use pair if they cover same definition occurrence of one variable but they don’t cover def-use pair of the same variable. …”
Get full text
Get full text
Thesis -
11
Design of low order quantitative feedback theory and H-infinity-based controllers using particle swarm optimisation for a pneumatic actuator system
Published 2010“…The second one is a wide range variation when the load mass M=0.1 to 100 kg which is required for the pneumatic servo actuators when they are used in missiles applications. PSO based QFT control algorithm is proposed for pneumatic servo actuator system. …”
Get full text
Get full text
Thesis -
12
Harmony Search-Based Fuzzy Clustering Algorithms For Image Segmentation
Published 2011“…This thesis aims to solve these problems using an efficient metaheuristic algorithm, known as the Harmony Search (HS) algorithm. …”
Get full text
Get full text
Thesis -
13
Time normalization of LPC feature using warping method
Published 2005“…The processed features are pitch and Linear Predictive Coefficients (LPC) for input and reference templates, based on Dynamic Time Warping (DTW) algorithm. The first task is to extract pitch features using Pitch Scale Harmonic Filter (PSHF) algorithm. …”
Get full text
Get full text
Get full text
Article -
14
Software regression test case prioritization for object-oriented programs using genetic algorithm with reduced-fitness severity
Published 2015“…And even though several of the code based addresses procedural programs. Some researchers addressed the issue of test case prioritization using Genetic Algorithm, but the authors do not select modification-revealing before prioritization and used the same fault severity. …”
Get full text
Get full text
Conference or Workshop Item -
15
Multi-base number representation in application to scalar multiplication and pairing computation
Published 2011“…Multi-bases number representation is used to construct new versions of Miller’s algorithm. …”
Get full text
Get full text
Thesis -
16
Data depublication using : Hashing algorithm / Naimah Nayan
Published 2019“…The hash value is generated by using hashing algorithm such as Message Digest 5 (MD5) and Secure Hashing Algorithm 1 (SHA-1). …”
Get full text
Get full text
Thesis -
17
A new machine learning-based hybrid intrusion detection system and intelligent routing algorithm for MPLS network
Published 2023“…This thesis proposes a hybrid ML-based intrusion detection system (ML-IDS) and ML-based intelligent routing algorithm (ML-RA) for MPLS network. …”
text::Thesis -
18
Computation of cryptosystem based on Lucas functions using addition chain
Published 2010“…It is based on Addition Chain. The computation time for existing and new algorithms will be recorded. …”
Get full text
Get full text
Conference or Workshop Item -
19
Enhance key generation algorithm based user string identity as public key
Published 2015“…This is due to two main reasons: i) this algorithm uses the same modulo value for every E-mail. …”
Get full text
Get full text
Thesis -
20
Image Processing Of Digital Mammograms For Breast Cancer Detection And Classification
Published 2018“…The algorithm may be developed for application in other field that uses greyscale image as well.…”
Get full text
Get full text
Monograph
