Search Results - (( java implementation using algorithm ) OR ( tree optimization techniques algorithm ))

Refine Results
  1. 1

    An algorithm for the selection of planting lining technique towards optimizing land area: an algorithm for planting lining technique selection by Md Badarudin, Ismadi, Md Sultan, Abu Bakar, Sulaiman, Md. Nasir, Mamat, Ali, Tengku Muda Mohamed, Mahmud

    Published 2012
    “…The three techniques with different planting lining direction lead to different number of trees, therefore the technique promotes the highest number of tree is optimal technique. …”
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2

    Optimizing tree planting areas through integer programming and improved genetic algorithm by Md Badarudin, Ismadi

    Published 2012
    “…The decision based on the highest number of trees is promoted among the three techniques. The process of block division and determining the optimal number of trees require a series of analysis. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Decision tree-based approach for online management of PEM fuel cells for residential application by Mohd Rusllim, Mohamed

    Published 2004
    “…A database is extracted from a previously-performed Genetic Algorithm (GA)-based optimization has been used to create a suitable decision tree, which was intended for generalizing the optimization results. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Decision tree-based approach for online management of pem fuel cells for residential application by Mohamed, Mohd Rusllim

    Published 2004
    “…In this research, a Decision Tree (DT) algorithm was employed to obtain the optimal, or quasi-optimal, settings of the fuel cell online and in a general framework. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  6. 6
  7. 7

    Amtree Protocol Enhancement by Multicast Tree Modification and Incorporation of Multiple Sources by Al‐Sharafi, Ali Mohammed Ali

    Published 2008
    “…By modifying the multicast tree, the number of nodes to be optimized was reduced. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Attribute related methods for improvement of ID3 Algorithm in classification of data: A review by Nur Farahaina, Idris, Mohd Arfian, Ismail

    Published 2020
    “…All the techniques assist the decision tree to find the most optimal attributes in each generation of the tree. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Optimized routing algorithm for mobile multicast source in Wireless Mesh Networks by Sanni, Mistura Laide, Hassan Abdalla Hashim, Aisha, Hassan, Wan Haslina, Anwar, Farhat, Ahmed, Gharib Subhi Mahmoud

    Published 2015
    “…Thus this paper proposes a Differential Evolution based optimized mobile multicast routing algorithm for the shared tree architecture. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  10. 10

    Provider independent cryptographic tools by Ibrahim, Subariah, Salleh, Mazleena, Abdul Aziz, Shah Rizan

    Published 2003
    “…The library is implemented by using Java cryptographic service provider framework that conforms to Java Cryptographic Architecture (JCA) and Java Cryptographic Extension (JCE). …”
    Get full text
    Get full text
    Get full text
    Monograph
  11. 11

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14

    Predicting building damage grade by earthquake: a Bayesian Optimization-based comparative study of machine learning algorithms by Al-Rawashdeh, Mohammad, Al Nawaiseh, Moh’d, Yousef, Isam, Bisharah, Majdi, Alkhadrawi, Sajeda, Al-Bdour, Hamza

    Published 2024
    “…Using metrics, this study evaluates Random Forest, ElasticNet, and Decision Tree algorithms. This study showed damage level asymmetry. …”
    Get full text
    Get full text
    Article
  15. 15

    Optimized tree-classification algorithm for classification of protein sequences by Iqbal, M.J., Faye, I., Said, A.M., Belhaouari Samir, B.

    Published 2016
    “…In this work, we have proposed an optimized tree-classification technique which uses cluster k nearest neighbor classification algorithm to classify protein sequences into superfamilies. …”
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    Optimized tree-classification algorithm for classification of protein sequences by Iqbal, M.J., Faye, I., Said, A.M., Belhaouari Samir, B.

    Published 2016
    “…In this work, we have proposed an optimized tree-classification technique which uses cluster k nearest neighbor classification algorithm to classify protein sequences into superfamilies. …”
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17

    Evaluation of data mining models for predicting concrete strength by Wong, Chuan Ming

    Published 2024
    “…The Particle Swarm Optimization algorithm is able to generate optimal values for the concrete features that maximizes the strength of concrete. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  18. 18

    Optimizing B-tree search performance of big data sets / Mohsen Marjani by Mohsen , Marjani

    Published 2017
    “…This study proposes an optimized B-tree search method to improve the execution time of the search tasks and to optimize the performance of the B-tree search process. …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    Ozone Concentration Forecasting Based on Artificial Intelligence Techniques: A Systematic Review by Yafouz A., Ahmed A.N., Zaini N., El-Shafie A.

    Published 2023
    “…Decision trees; Forecasting; Multilayer neural networks; Ozone; Predictive analytics; Support vector machines; Artificial intelligence techniques; Machine learning techniques; Multi layer perceptron; Optimization approach; Ozone concentration forecasting; Prediction accuracy; Stand-alone algorithm; Tropospheric ozone concentration; Learning systems; ozone; air quality; algorithm; concentration (composition); machine learning; optimization; ozone; prediction; theoretical study; air pollutant; air quality; artificial intelligence; artificial neural network; concentration (parameter); decision tree; feed forward neural network; forecasting; fuzzy system; human; measurement accuracy; multilayer perceptron; prediction; random forest; recurrent neural network; Review; support vector machine; systematic review…”
    Review
  20. 20

    Performance evaluation of real-time multiprocessor scheduling algorithms by Alhussian, H., Zakaria, N., Abdulkadir, S.J., Fageeri, S.O.

    Published 2016
    “…We hyave used the CPU profiler of Oracle JavaTM VisualVM to monitor the execution of LRE-TL as well as USG algorithms. …”
    Get full text
    Get full text
    Conference or Workshop Item