Search Results - (( programming using normalization algorithm ) OR ( java applications tree algorithm ))
Search alternatives:
- normalization algorithm »
- java applications »
- applications tree »
- tree algorithm »
-
1
-
2
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
Get full text
Get full text
Get full text
Article -
3
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
4
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…This thesis is based on the application of sentiment classification algorithm to tweet data with the goal of classifying messages based on the polarity of sentiment towards a particular topic (or subject matter). …”
Get full text
Get full text
Get full text
Thesis -
5
Parallel computation of maass cusp forms using mathematica
Published 2013“…We find that the parallel programming is about 5.75 times faster than the normal programming while its efficiency is capped at 0.443.…”
Get full text
Get full text
Thesis -
6
Logic Programming In Radial Basis Function Neural Networks
Published 2013“…I used different types of optimization algorithms to improve the performance of the neural networks. …”
Get full text
Get full text
Thesis -
7
Semi-automatic cortical boundary detection / Noor Elaiza Abdul Khalid.
Published 2010Get full text
Get full text
Thesis -
8
Smart energy meter with adaptive communication data transfer algorithm for electrical energy monitoring
Published 2021“…The prototype is constructed through software and hardware development and has been programmed using Arduino IDE software. An algorithm for selecting communication system is developed by comparing Received Signal Strength Indicator (RSSI) of Wi-Fi and GSM with the priority given to Wi-Fi, followed by GSM and RF. …”
Get full text
Get full text
Thesis -
9
Solving non-convex economic dispatch problem using computational intelligence technique
Published 2023Conference Paper -
10
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…In this paper, we propose an improvement of pattern growth-based PrefixSpan algorithm, called I-PrefixSpan. The general idea of I-PrefixSpan is to use the efficient data structure for general tree-like framework and separator database to reduce the execution time and memory usage. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
11
-
12
AI powered asthma prediction towards treatment formulation: an android app approach
Published 2022“…We utilized eight robust machine learning algorithms to analyze this dataset. We found that the Decision tree classifier had the best performance, out of the eight algorithms, with an accuracy of 87%. …”
Get full text
Get full text
Get full text
Article -
13
Statistical approach on grading: mixture modeling
Published 2006“…The Gibbs sampler algorithm is applied using the WinBUGS programming package. …”
Get full text
Get full text
Thesis -
14
GPS boundary navigation of DrosoBots using MATLAB simulation
Published 2010“…The results from the experiment show that the Levy flight algorithm is more suitable to be used compared to normal random. …”
Get full text
Get full text
Proceeding Paper -
15
Calculation of normalized input admittance for dielectric measurements of lossy materials (software development) / Mohamad Rizal Maarof
Published 1996“…In this project,we describe a computer program using FORTRAN 77 for calculation of input admittance of a smaller waveguide radiating into a larger waveguide. …”
Get full text
Get full text
Thesis -
16
Multi -Objective Economic Dispatch Using Evolutionary Programming
Published 2023“…The designated algorithm of MOEP used MATLAB to run the simulations. …”
-
17
-
18
Data mining in network traffic using fuzzy clustering
Published 2003“…The fuzzy clustering process are made using three algorithms : Fuzzy C-Means (FCM), Gustafsof-Kessel (GK) and Gath-Geva (GG) algorithm. …”
Get full text
Get full text
Thesis -
19
Data mining in network traffic using fuzzy clustering
Published 2003“…The fuzzy clustering process are made using three algorithms : Fuzzy C-Means (FCM), Gustafsof-Kessel (GK) and Gath-Geva (GG) algorithm. …”
Get full text
Get full text
Thesis -
20
Early detection and mitigation of DDoS attacks in software defined networks
Published 2018“…To detect and mitigate this attack at its early stages, an entropy-based DDoS attack detection and mitigation algorithm was proposed. The algorithm was written in Python programming language to be implementing on a POX controller. …”
Get full text
Get full text
Thesis
