Search Results - (( program implementing private algorithm ) OR ( java implementation tree algorithm ))

  • Showing 1 - 12 results of 12
Refine Results
  1. 1

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde by Ogunfolajin Maruff , Tunde

    Published 2022
    “…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization by Mohammad Ata, Karimeh Ibrahim

    Published 2019
    “…This study proposes a car parking management system which applies Dijkstra’s algorithm, Ant Colony Optimization (ACO) and Binary Search Tree (BST) in structuring a guidance system for indoor parking. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Web page application was programmed by Java Enterprise Edition (J2EE). Signatory however use a special Digital Signature Application which store the secret private key. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Improving the security model of software define networks by Ismail Ibrahim Mohamed Almahdy

    Published 2023
    “…By exposing the SDN main controller network with various simulated scenario like a virus attack, a program is written to ensure that the implementation of the attack from an attacker could be put to stop. …”
    text::Final Year Project
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10

    Facilitating English Language teaching through AI- based drama in Palestine by Bsharat, Tahani, Sheikh Ahmad, Ismail

    Published 2025
    “…Artificial Intelligence (AI) has the potential to significantly reshape the landscape of education through the integration of AI- powered tools, personalized learning algorithms, and virtual and augmented reality. In a study exploring the integration of AI- based drama in English language teaching in Palestine, a cohort of 43 teachers from both governmental and private schools participated in a questionnaire- based assessment. …”
    Get full text
    Get full text
    Get full text
    Book Chapter
  11. 11

    Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC by Ismail, Haqi Khalid

    Published 2021
    “…ECC encrypts and transfers the private keys as AES private keys in the proposed scheme, while AES encrypts the plain text (communication data). …”
    Get full text
    Get full text
    Thesis
  12. 12

    Dynamic investment model for the restructed power market in the presence of wind source by Esfahani, Mohammad Tolou Askari Sedehi

    Published 2014
    “…In the third step, the long term optimal investment strategies of the hybrid wind-thermal investor are determined based on the dynamic programming algorithm by considering the long term states of demand growth and fuel price uncertainties. …”
    Get full text
    Get full text
    Thesis