Search Results - (( tree visualisation using algorithmic ) OR ( java application modified algorithm ))
Search alternatives:
- application modified »
- visualisation using »
- tree visualisation »
- java application »
-
1
Correlation analysis and predictive performance based on KNN and decision tree with augmented reality for nuclear primary cooling process / Ahmad Azhari Mohamad Nor
Published 2024“…Subsequently, predictive models employing k-nearest neighbour and decision tree algorithms are constructed and evaluated based on accuracy, precision, and recall metrics. …”
Get full text
Get full text
Thesis -
2
Parameter estimation and outlier detection in linear functional relationship model / Adilah Abdul Ghapor
Published 2017“…As for the multiple outliers, a clustering algorithm is considered and a dendogram to visualise the clustering algorithm is used. …”
Get full text
Get full text
Get full text
Thesis -
3
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
4
Sales prediction for Adha Station by using predictive analytics
Published 2025“…Additionally, pre-processing is conducted using the RapidMiner application prior to mapping the cleaned data with three distinct algorithms for predictive analysis: Decision Tree, Random Forest, and Multiple Linear Regression techniques. …”
Get full text
Get full text
Student Project -
5
A 'snowflake' geometrical representation for optimised degree six 3-modified chordal ring networks
Published 2016“…This research was aimed at the investigation of a new degree six chordal ring, the optimised degree six 3-modified chordal ring CHR6o3. A tree visualisation was constructed based on its connectivity to enable the generation of formulae for optimal diameter and average optimal path lengths. …”
Get full text
Get full text
Conference or Workshop Item -
6
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…A GUI is created in a form of JAVA application to display data detected from tag. …”
Get full text
Get full text
Thesis -
7
Automatic generation of content security policy to mitigate cross site scripting
Published 2016“…The algorithm is implemented as a plugin. It does not interfere with the web application original code. …”
Get full text
Get full text
Conference or Workshop Item -
8
Predictive analytics for pacemaker medical instrument stock management of Transmedic Healthcare
Published 2025“…This study focuses on pacemaker inventory management regarding inefficiencies in forecasts, resultant overstocking, and stockouts due to highly manual data entry at the front end and limited ERP visualisation capabilities. The research applies the CRISP-DM methodology, examining current stock processes, and then collecting and cleansing historical data to develop Always Better Control (ABC) for stock analysis and predictive models using classification and also making a comparison between three algorithms, which are Naive Bayes, Random Forest and Decision Tree. …”
Get full text
Get full text
Student Project -
9
Bioinformatics analysis and spatiotemporal distribution of the f lic gene and its protein isolated from Escherichia coli-infected patients in Eastern Algeria
Published 2024“…The alignment results were then visualised using the MView programme. Finally, a phylogenetic tree was constructed using the maximum likelihood algorithm in MEGA 11 software. …”
Get full text
Get full text
Get full text
Article -
10
Bioinformatics analysis and spatiotemporal distribution of the fliC gene and its protein isolated from Escherichia coli-infected patients in eastern Algeria
Published 2024“…The alignment results were then visualised using the MView programme. Finally, a phylogenetic tree was constructed using the maximum likelihood algorithm in MEGA 11 software. …”
Get full text
Get full text
Get full text
Article -
11
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis -
12
