Search Results - (( process using three algorithm ) OR ( java application tree algorithm ))
Search alternatives:
- java application »
- application tree »
- three algorithm »
- tree algorithm »
-
1
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…This work employed the use of machine learning approach. Four conventional classification algorithms: naïve bayes (NB), support vector machines (SVM), nearest neighbor (k-NN), and decision trees (J48) classifiers are implemented in identifying and categorizing tweet data of three political figures in Malaysia: Dato Seri Anwar, Dato Hadi Awang, and Lim Guang Eng, as either positive, negative, or neutral perceptions. …”
Get full text
Get full text
Get full text
Thesis -
2
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
Get full text
Get full text
Get full text
Article -
3
-
4
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
5
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…In this paper, we propose an improvement of pattern growth-based PrefixSpan algorithm, called I-PrefixSpan. The general idea of I-PrefixSpan is to use the efficient data structure for general tree-like framework and separator database to reduce the execution time and memory usage. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
6
AI powered asthma prediction towards treatment formulation: an android app approach
Published 2022“…We utilized eight robust machine learning algorithms to analyze this dataset. We found that the Decision tree classifier had the best performance, out of the eight algorithms, with an accuracy of 87%. …”
Get full text
Get full text
Get full text
Article -
7
AI powered asthma prediction towards treatment formulation : An android app approach
Published 2022“…We utilized eight robust machine learning algorithms to analyze this dataset. We found that the Decision tree classifier had the best performance, out of the eight algorithms, with an accuracy of 87%. …”
Get full text
Get full text
Get full text
Article -
8
Automatic Additive Manufacturing Product Generation Through Computer Aided Process Planning Using 3D/4D/5D Printing
Published 2022“…Then, the algorithm will be tested whether it can be extended up to 5D printing by using three different types of models with a different printing process. …”
Get full text
Get full text
Monograph -
9
Makespan algorithms and heuristic for internet-based collaborative manufacturing process using bottleneck approach
Published 2010“…The collaborative manufacturing process resembles a permutation re-entrant flow shop environment with four machines executing the process routing of M1,M2,M3,M4,M3,M4 in which the combination of the last three processes of M4,M3,M4 has high tendency of exhibiting dominant machine character�istic. …”
Get full text
Get full text
Get full text
Article -
10
Enhancing Classification Algorithms with Metaheuristic Technique
Published 2024“…In its operation, the metaheuristic algorithm optimizes the feature selection process,which will later be processed using the classification algorithm.Three (3) meta-heuristics were implemented, namely Genetic Algorithm, Particle Swarm Optimization, and Cuckoo Search Algorithm; the experiment was conducted, and the results were collected and analyzed. …”
Get full text
Get full text
Get full text
Article -
11
Stereolithography 3D printing development of 3D printing machine controller using the predefined closest-distance volume interpolator system
Published 2019“…Recent advancement in 3D printing technology has led to the development of projection mask stereolithography 3D printing process. …”
Get full text
Get full text
Research Report -
12
Performance comparison analysis of aes-256 sha-256-hmac, aes-256 md5-hmac, 3des sha-256-hmac and 3des-md5-hmac on ipsec vpn using gns3 / Mohd Hilman Lukman
Published 2016“…All the experiments are using GNS3.…”
Get full text
Get full text
Thesis -
13
MINIMIZATION OF MACHINING PROCESS SEQUENCE BASED ON ANT COLONY ALGORITHM AND CONVENTIONAL METHOD
Published 2023“…Matlab software was used to develop the algorithm based on Ant Colony, which was then used to optimize the process sequence. …”
Get full text
Get full text
Article -
14
MINIMIZATION OF MACHINING PROCESS SEQUENCE BASED ON ANT COLONY ALGORITHM AND CONVENTIONAL METHOD
Published 2023“…Matlab software was used to develop the algorithm based on Ant Colony, which was then used to optimize the process sequence. …”
Get full text
Get full text
Article -
15
MINIMIZATION OF MACHINING PROCESS SEQUENCE BASED ON ANT COLONY ALGORITHM AND CONVENTIONAL METHOD
Published 2023“…Matlab software was used to develop the algorithm based on Ant Colony, which was then used to optimize the process sequence. …”
Get full text
Get full text
Article -
16
MINIMIZATION OF MACHINING PROCESS SEQUENCE BASED ON ANT COLONY ALGORITHM AND CONVENTIONAL METHOD
Published 2023“…Matlab software was used to develop the algorithm based on Ant Colony, which was then used to optimize the process sequence. …”
Get full text
Get full text
Article -
17
Contour generation for mask projection stereolithography 3D printing
Published 2019“…Recent advancement in 3D printing technology has led to the development of projection mask stereolithography 3D printing process. …”
Get full text
Get full text
Thesis -
18
Encrypted email using 3D AES block cipher algorithm / Khairah Mohd Wi
Published 2015“…Encrypted email is addition mail that comes up with prototype application called,3D-AES block cipher. There are three objective designed: To identify an encrypted email application development of 3D AES block cipher algorithm and hash process, to develop encrypted email using 3D AES process on email and lastly to measure the validity of the encrypted & decrypted email message by comparing the hash value generate before encrypt and after decrypt. …”
Get full text
Get full text
Thesis -
19
Contour generation algorithm for Projection Mask Stereolithography 3D printing process
Published 2018Get full text
Get full text
Conference or Workshop Item -
20
Minimization of machining process sequence based on ant colony algorithm and conventional method
Published 2023“…Matlab software was used to develop the algorithm based on Ant Colony, which was then used to optimize the process sequence. …”
Get full text
Get full text
Get full text
Article
