Search Results - (( using modification tree algorithm ) OR ( java application designing algorithm ))
Search alternatives:
- application designing »
- designing algorithm »
- using modification »
- modification tree »
- java application »
- tree algorithm »
-
1
-
2
Amtree Protocol Enhancement by Multicast Tree Modification and Incorporation of Multiple Sources
Published 2008“…In mobile environment, when the source is mobile and migrates to a new location, the multicast tree needs to be rebuilt. AMTree is an active network based protocol intended to make the sending packets to the tree after source migration an efficient process without much modifications to the multicast tree. …”
Get full text
Get full text
Thesis -
3
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
4
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
5
Pattern generation through feature values modification and decision tree ensemble construction
Published 2013“…It is found that the performance of bagging and RSM algorithms can be improved by incorporating feature values modification with their training processes. …”
Get full text
Get full text
Get full text
Article -
6
Research on risk detection of autonomous vehicle based on rapidly-exploring random tree
Published 2023“…On the premise of ensuring safety and meeting the requirements of the vehicle’s kinematic constraints through the expansion of obstacles, the dynamic step size is used for random tree growth. A non-particle collision detection (NPCD) collision detection algorithm and path modification (PM) path modification strategy are proposed for the collision risk in the turning process, and geometric constraints are used to represent the possible security threats, so as to improve the efficiency and safety of vehicle global path driving and to provide reference for the research of driverless vehicles.…”
Get full text
Get full text
Get full text
Get full text
Article -
7
Classification of stock market index based on predictive fuzzy decision tree
Published 2005“…In this research, another modification of Fuzzy Decision Tree (FDT) classification techniques called predictive FDT is presented that aims to combine symbolic decision trees in data classification with approximate reasoning offered by fuzzy representation. …”
Get full text
Get full text
Thesis -
8
-
9
-
10
Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework
Published 2004“…Java Media Framework library and the RTP protocol for audio transmission were used as development tools.The developed system designed in this thesis together with experimental results proved that the system could be implemented successfully. …”
Get full text
Get full text
Thesis -
11
-
12
Edge assisted crime prediction and evaluation framework for machine learning algorithms
Published 2022“…To anticipate occurrences, ML methods such as Decision Trees, Neural Networks, K-Nearest Neighbors, and Impact Learning are being utilized, and their performance is compared based on the data processing and modification used. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
13
Classification with degree of importance of attributes for stock market data mining
Published 2004“…We present another modification of fuzzy decision tree (FDT) classification techniques that aims to combine symbolic decision trees in data classification with approximate reasoning offered by fuzzy representation. …”
Get full text
Get full text
Article -
14
Hybrid tabu search – strawberry algorithm for multidimensional knapsack problem
Published 2022“…Multidimensional Knapsack Problem (MKP) has been widely used to model real-life combinatorial problems. It is also used extensively in experiments to test the performances of metaheuristic algorithms and their hybrids. …”
Get full text
Get full text
Get full text
Thesis -
15
Design Of Robot Motion Planning Algorithm For Wall Following Robot
Published 2006Get full text
Get full text
Monograph -
16
-
17
Network game (Literati) / Chung Mei Kuen
Published 2003“…The main aspect of this thesis is to produce a networked gaming system, which process players. requested to play the game and enabling users to play the graphical game with people through the network. The algorithm design and implementation method must not only be workable, but also highly efficient in terms of execution speed and response time. …”
Get full text
Get full text
Thesis -
18
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…The application is designed to satisfy the user friendly interfaces and intent to be used by the end user without having the advanced knowledge in mobile security. …”
Get full text
Get full text
Conference or Workshop Item -
19
Bayesian random forests for high-dimensional classification and regression with complete and incomplete microarray data
Published 2018“…Random Forests (RF) are ensemble of trees methods widely used for data prediction, interpretation and variable selection purposes. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
20
Improving Class Timetabling using Genetic Algorithm
Published 2006“…We have targeted the research on class timetabling problem. Hence, Genetic Algorithm (GA) is used as one of the most popular optimization solutions. …”
Get full text
Get full text
Get full text
Thesis
