Search Results - (( program missing data algorithm ) OR ( java implementation tree algorithm ))
Search alternatives:
- java implementation »
- implementation tree »
- data algorithm »
- tree algorithm »
- missing data »
-
1
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
Get full text
Get full text
Get full text
Article -
2
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
Get full text
Get full text
Get full text
Thesis -
3
Implementing frequency translation by adapting digital phase shifter for WCDMA using XILINX: article
Published 2009“…In order to make sure the data is shifted accordingly, it can be seen by simulating the written program of its testbench by mapping the entire written block diagram based on the algorithm itself. …”
Get full text
Get full text
Article -
4
Implementation frequency translation by adapting digital phase shifter for WCDMA using XILINX
Published 2009“…In order to make sure the data is shifted accordingly, it can be seen by simulating the written program of its testbench by mapping the entire written block diagram based on the algorithm itself. …”
Get full text
Get full text
Student Project -
5
Twofold Integer Programming Model for Improving Rough Set Classification Accuracy in Data Mining.
Published 2005“…The accuracy for rules and classification resulted from the TIP method are compared with other methods such as Standard Integer Programming (SIP) and Decision Related Integer Programming (DRIP) from Rough Set, Genetic Algorithm (GA), Johnson reducer, HoltelR method, Multiple Regression (MR), Neural Network (NN), Induction of Decision Tree Algorithm (ID3) and Base Learning Algorithm (C4.5); all other classifiers that are mostly used in the classification tasks. …”
Get full text
Get full text
Thesis -
6
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…This study proposes a car parking management system which applies Dijkstra’s algorithm, Ant Colony Optimization (ACO) and Binary Search Tree (BST) in structuring a guidance system for indoor parking. …”
Get full text
Get full text
Thesis -
7
A mixed integer linear programming model for real-time task scheduling in multiprocessor computer system
Published 2012“…This may lead to low quality service and deadline misses. The advent of multi-processor systems offers a more efficient way of processing multimedia data in real-time.With the development of appropriate scheduling algorithm, another challenge is the mode of assigning tasks in multi-processor systems.This calls for the use of an appropriate mathematical model that will take cognizance of the nature of variables involved.In this research work, a Mixed Integer Linear Programming Model (MILP) was developed to assign tasks in a multiprocessor system.The MILP model was used to assign tasks to multi-processor systems ranging between 5 and 10 homogeneous processors.The result of the simulation runs shows that with the appropriate scheduling algorithm, a high success rate ratio and guaranteed number of deadlines met could be achieved.…”
Get full text
Get full text
Get full text
Article -
8
Predicting uniaxial compressive strength using Support Vector Machine algorithm
Published 2019“…This paper presents the application of Support Vector Machine (SVM) algorithm to predict the UCS. An algorithm has been tested on a series of rock data using dry density and velocity parameters. …”
Get full text
Get full text
Article -
9
A stylometry approach for blind linguistic steganalysis model against translation-based steganography
Published 2023“…However, accuracy of blind steganalysis algorithms highly depend on the features selected from the input data especially when attacking embedding techniques in TBS. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
10
-
11
