Search Results - (( solution implementation tree algorithm ) OR ( java application customization algorithm ))

Refine Results
  1. 1

    Optimizing tree planting areas through integer programming and improved genetic algorithm by Md Badarudin, Ismadi

    Published 2012
    “…The algorithmic solution with some strategies mainly focuses on efficiency. …”
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3

    Data Classification and Its Application in Credit Card Approval by Thai , VinhTuan

    Published 2004
    “…This project is involved with identification of the available algorithms used in data classification and the implementation of C4.5 decision tree induction algorithm in solving the data classifying task. …”
    Get full text
    Get full text
    Final Year Project
  4. 4

    Adaptive rapidly-exploring-random-tree-star (Rrt*) -Smart: algorithm characteristics and behavior analysis in complex environments by Jauwairia Nasir, Fahad Islam, Yasar Ayaz

    Published 2013
    “…However, its limitations include the infinite time it takes to reach the optimal solution and a very slow rate of convergence. Just recently the authors have introduced RRT*-Smart which is a rapid convergence implementation of RRT* for improved efficient path planning both in terms of planning time as well as path cost. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Shape assignment by genetic algorithm towards designing optimal areas by Md Badaruddin, Ismadi, Md Sultan, Abu Bakar, Sulaiman, Md. Nasir, Mamat, Ali, Tengku Muda Mohamed, Mahmud

    Published 2010
    “…GAs by implementing some metaheuristic approaches is one of the most common techniques for handling ambiguous and / or vast possible solutions. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6
  7. 7

    Footwear quality evaluation using decision tree and logistic regression models by Tan, Swee Choon

    Published 2022
    “…The model can be implemented to determine the best solution to improve the quality and performance of the footwear product.…”
    Get full text
    Get full text
    Thesis
  8. 8

    An efficient model for indoor radio signal prediction and coverage estimation / Md. Sumon Sarker by Md. Sumon, Sarker

    Published 2011
    “…Genetic algorithm is combined with the Breath First Search (BFS) algorithm incorporated with Branch-And-Bound terminology while exploring the search space tree to achieve the optimum coverage solution. …”
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10

    A Mininet emulation study for SDN fat tree data center sleep mode routing algorithms by Fawzi S., Din N.M.

    Published 2025
    “…In this scenario, the implementation of sleep mode in software defined network (SDN) data centres could provide an energy aware solution. …”
    Article
  11. 11

    A Robust Graph Theoretic Solution of Routing in Intelligent Networks by Qureshi, M.A., Hassan, M.F., Ehsan, M.K., Khan, M.O., Ali, M.Y., Khan, S.

    Published 2022
    “…That is why a simple and efficient algorithm is the need of the time. A robust routing solution SPT with OV+E time complexity is proposed to supersede the existing landmark. …”
    Get full text
    Get full text
    Article
  12. 12

    Developing an app for streamlined inventory tracking with barcode scanning and load planning optimization by Teng, Yan Xin

    Published 2025
    “…The application was implemented using React Native for mobile development and Firebase Firestore as the backend database to enable real-time data synchronization, while a binary tree bin packing algorithm was applied to generate efficient cargo loading arrangements. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  13. 13

    Poverty risk prediction based on socioeconomic factors using machine learning approach by Mohd Zawari, Nur Farhana Adibah

    Published 2025
    “…Information gain was used in the feature selection and four classification algorithms namely, Logistic Regression, Random Forest, Decision Tree, and Gradient Boosted, were implemented and tested with the incorporation of 10-fold cross-validation and splitting 70:30 in WEKA. …”
    Get full text
    Get full text
    Student Project
  14. 14

    Design of a multicast router for network-on-chip architectures with irregular topologies by Tseng, Hsi-Che, Ye, Zhi-Hong, Chi, Hsin-Chou

    Published 2015
    “…In this paper, we present the design and implementation of a multicast router for NoC with irregular topologies.The router employs our previously proposed tree-based routing algorithm for irregular networks.Our experiment results show that the multicast router has a slightly lower clock rate and moderately larger chip area than the unicast router in NoC.Since multicasting is a technique providing superior network performance, especially for large networks, such multicast router design is an effective routing solution for large-scale network-on-chip architectures.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17

    Analyzing visitor trends to optimize data-driven strategies in Pusat Sains & Kreativiti Terengganu by Zainol Abidin, Nur Sarah

    Published 2025
    “…To overcome these issues, historical visitor data from January 2022 to December 2024 was collected and analyzed using the CRISP-DM methodology, which guided the project through business understanding, data preparation, modelling, and deployment. Three predictive algorithms including Decision Tree (DT), Random Forest (RF), and Naive Bayes (NB) were tested to classify visitor levels into low, medium, and high categories. …”
    Get full text
    Get full text
    Student Project
  18. 18
  19. 19

    Industrial datasets with ICS testbed and attack detection using machine learning techniques by Mubarak, Sinil, Habaebi, Mohamed Hadi, Islam, Md Rafiqul, Balla, Asaad, Tahir, Mohammad, Elsheikh, Elfatih A A, Suliman, F M

    Published 2021
    “…Industrial control systems (ICS) are the backbone for the implementation of cybersecurity solutions. They are susceptible to various attacks, due to openness in connectivity, unauthorized attempts, malicious attacks, use of more commercial off the shelf (COTS) software and hardware, and implementation of Internet protocols (IP) that exposes them to the outside world. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Multicast-Based Mobile Ipv6 Join/Leave Mechanism Software by A.M. Ali, Sahar

    Published 2003
    “…IP-multicast provides efficient algorithms for multiple packet delivery. It also provides location-independent group addressing. …”
    Get full text
    Get full text
    Thesis