Search Results - (( java application tree algorithm ) OR ( data applications interface algorithm ))

Refine Results
  1. 1
  2. 2

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3
  4. 4
  5. 5

    Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde by Ogunfolajin Maruff , Tunde

    Published 2022
    “…This thesis is based on the application of sentiment classification algorithm to tweet data with the goal of classifying messages based on the polarity of sentiment towards a particular topic (or subject matter). …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    Development of real-time software interface for multicomponent transient signal analysis using Labview and Matlab by Salami, Momoh Jimoh Emiyoka, Tijani, Ismaila, Jibia, Abdussamad Umar

    Published 2011
    “…The developed software interface was evaluated with experimental fluorescence data collected from a spectrofluorometer system. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  8. 8
  9. 9

    Real time power quality event detection using continuous wavelet transform by Tan R.H.G., Ramachandaramurthy V.K.

    Published 2023
    “…The measurement hardware consists of data acquisition module with USB interface and the wavelet event detection algorithm was developed using MATLAB with graphical user interface to display the wavelet coefficients in real time and the recorded waveform. …”
    Conference paper
  10. 10
  11. 11

    Mining Sequential Patterns Using I-PrefixSpan by Dhany , Saputra, Rambli Dayang, R.A., Foong, Oi Mean

    Published 2007
    “…In this paper, we propose an improvement of pattern growth-based PrefixSpan algorithm, called I-PrefixSpan. The general idea of I-PrefixSpan is to use the efficient data structure for general tree-like framework and separator database to reduce the execution time and memory usage. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12

    Augmented reality monitoring system for cross-belt conveyor in advanced automation line / Sukarnur Che Abdullah ... [et al.] by Che Abdullah, Sukarnur, Amari, Mohamad Dzulhelmy, Mat Jusoh, Mohammad Azzeim, Amirudin, Irfan Syahmi Rusyaidi, Zainalabidin, Ashraf

    Published 2025
    “…The findings indicate that the AR Simulation application is a robust tool, with AR’s interactive features effectively rendering data under the defined algorithms. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13
  14. 14
  15. 15

    AI powered asthma prediction towards treatment formulation: an android app approach by Murad, Saydul Akbar, Adhikary, Apurba, Md Muzahid, Abu Jafar, Sarker, Md Murad Hossain, Khan, Md. Ashikur Rahman, Hossain, Md. Bipul, Bairagi, Anupam Kumar, Masud, Mehedi, Kowsher, Md

    Published 2022
    “…We utilized eight robust machine learning algorithms to analyze this dataset. We found that the Decision tree classifier had the best performance, out of the eight algorithms, with an accuracy of 87%. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16
  17. 17
  18. 18

    Personality prediction using Random Forest algorithm / Wan Abdul Qayyum Abdul Wahab by Abdul Wahab, Wan Abdul Qayyum

    Published 2023
    “…The research objectives included developing and executing a data gathering strategy, analyzing the data, and assessing the model's performance. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Enhancing Secure Sockets Layer Bulk Data Trnsfer Phase Performance With Parallel Cryptography Algorithm by Mohammed Alaidaros, Hashem

    Published 2007
    “…The proposed algorithm performs the encryption of the data and the calculation of the MAC in parallel. …”
    Get full text
    Get full text
    Thesis
  20. 20