Search Results - (( java implementation tree algorithm ) OR ( using same using algorithmic ))

Refine Results
  1. 1

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde by Ogunfolajin Maruff , Tunde

    Published 2022
    “…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization by Mohammad Ata, Karimeh Ibrahim

    Published 2019
    “…This study proposes a car parking management system which applies Dijkstra’s algorithm, Ant Colony Optimization (ACO) and Binary Search Tree (BST) in structuring a guidance system for indoor parking. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Comparative Performance Analysis of Bat Algorithm and Bacterial Foraging Optimization Algorithm using Standard Benchmark Functions by Mazlina, Abdul Majid, Alsariera, Yazan A., Alamri, Hammoudeh S., Nasser, Abdullah M., Kamal Z., Zamli

    Published 2014
    “…In order to ensure fair comparison, both BFO and BA are implemented using the same data structure and the same language and running in the same platform (i.e. …”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Comparison of performances of Jaya Algorithm and Cuckoo Search algorithm using benchmark functions by Ahmed, Mashuk, Nasser, Abdullah B., Kamal Z., Zamli, Heripracoyo, Sulistyo

    Published 2022
    “…CS and JA have implemented in the same platform (Intellij IDEA Community Edition 2020.2.3) using the same language (Java). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    Data depublication using : Hashing algorithm / Naimah Nayan by Nayan, Naimah

    Published 2019
    “…The hash value is generated by using hashing algorithm such as Message Digest 5 (MD5) and Secure Hashing Algorithm 1 (SHA-1). …”
    Get full text
    Get full text
    Thesis
  7. 7

    Time normalization of LPC feature using warping method by Sudirman, Rubita, Salleh, Sh. Hussain, Khalid, Puspa Inayat, Ahmad, Abd. Hamid

    Published 2005
    “…Another task is to align the input frames (test set) to the reference template (training set) using DTW fixing frame (DTW-FF) algorithm. This proper time normalization is needed since NN is designed to compare data of the same length whilst same speech can varies in their length. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Travelling salesman problem using genetic algorithm / Muhammad Faiz Wafiq Mohd Zaini, Nurin Hannani Mohd Bakhary and Nur Aishah Zakaria by Mohd Zaini, Muhammad Faiz Wafiq, Mohd Bakhary, Nurin Hannani, Zakaria, Nur Aishah

    Published 2022
    “…In each iteration, the selection step compare and select the minimum distance for each chromosome. The result shows using Genetic Algorithm operator can help Travelling Salesmen to minimize the distance effectively and to make it more effective Travelling Salesmen need to use three Genetic Algorithms’ operator. …”
    Get full text
    Get full text
    Student Project
  9. 9

    DC Motor Controller Using Linear Quadratic Regulator (LQR) Algorithm Implementation on PIC by Mohd Isa, Nur Iznie Afrah

    Published 2008
    “…As the result, the output must be the same as or approximately the same as the input voltage. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  10. 10

    Performance Analysis of Hexagon-Diamond Search Algorithm for Motion Estimation using MATLAB by Abdul Manap, Redzuan, Ranjit, S.S.S.

    Published 2010
    “…One of ME techniques, known as Block Matching Algorithm (BMA), has been widely used in various video coding standards. …”
    Get full text
    Get full text
    Article
  11. 11

    Affine projection algorithm for speech enhancement using controlled projection order by Noor, Ali O. Abid

    Published 2020
    “…The MSE of the proposed VPAPA method drops to -65 dB in steady state compared to -20 dB using NLMS and just below -30 dB using standard APA with projection order of 8, while the powerful RLS reaches around -60dB under the same environment. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    JPEG Image Encryption Using Combined Reversed And Normal Direction-Distorted Dc Permutation With Key Scheduling Algorithm-Based Permutation by Abu, Ahmad Zaidee

    Published 2008
    “…The proposed approach uses a frequency domain combinational framework of coefficients scrambling with Key Scheduling Algorithm based (KSA-based) permutation. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Image Processing Of Digital Mammograms For Breast Cancer Detection And Classification by Mohd Nizom, Ahmad Nabil

    Published 2018
    “…The algorithm may be developed for application in other field that uses greyscale image as well.…”
    Get full text
    Get full text
    Monograph
  14. 14

    An improved method in speech signal input representation based on DTW technique for NN speech recognition system by Sudirman, Rubita, Salleh, Sh. Hussain, Salleh, Shaharuddin

    Published 2007
    “…Another task of the study is to extract pitch features using the Harmonic Filter algorithm. After pitch extraction and linear predictive coefficient (LPC) features fixed to a desired number of frames, speech recognition using neural network can be performed and results showed a very promising solution. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Incorporating stemming algorithm in the Malay information retrieval that employs Thesaurus aproach / Mohd Rosmadi Mokhtar by Mokhtar, Mohd Rosmadi

    Published 2001
    “…One of well-known conflation methods is stemming algorithms, where it is used to identify morphological variants. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Implementation Of Hardware Software Partitioning In Embedded System by Mohd Nor, Masyirah

    Published 2018
    “…The result shows that, the GA algorithm has better total area and total execution time but same cost compared to the PSO algorithm. …”
    Get full text
    Get full text
    Monograph
  17. 17

    NN speech recognition utilizing aligned DTW local distance scores by Sudirman, Rubita, Salleh, Sh-Hussain, Ting, Chee Ming

    Published 2005
    “…The LPC features are aligned between the input frames (test set) to the reference (training set) using our DTW fixing frame (DTW-FF) algorithm. This proper time normalization is needed since NN is designed to compare data of the same length, whilst same speech can varies in their length. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18

    Comparative study on different type of multiplier in verilog HDL: article / Nik Ahmad Afnan Nik Azman by Nik Azman, Nik Ahmad Afnan

    Published 2018
    “…To check the validity and functionality of the multiplier, Modelsim software are used. The same input data is used on each multiplier because it is expected to get the same output. …”
    Get full text
    Get full text
    Article
  19. 19

    USING LATENT SEMANTIC INDEXING FOR DOCUMENT CLUSTERING by MUFLIKHAH, LAILIL

    Published 2010
    “…A variant of distance measurement, cosine similarity, is also embedded to this algorithm. The results are then compared with some existing algorithms, which are used for benchmark purposes. …”
    Get full text
    Get full text
    Thesis
  20. 20

    An intermediate significant bit (ISB) watermarking technique using neural networks by Zeki, A., Abubakar, A., Chiroma, H.

    Published 2016
    “…Many researchers have used these approaches to evaluate their algorithms. …”
    Get full text
    Get full text
    Article