Search Results - (( java application tree algorithm ) OR ( parameter evaluation max algorithm ))
Search alternatives:
- parameter evaluation »
- java application »
- application tree »
- tree algorithm »
- evaluation max »
- max algorithm »
-
1
Quality of service management algorithms in WiMAX networks
Published 2015“…Simulation have been extensively used to evaluate the proposed algorithm. Finally, Discrete Event Simulator (DES) is designed and developed in order to evaluate the performance of the proposed algorithms. …”
Get full text
Get full text
Thesis -
2
-
3
Integrated combined layer algorithm of jamming detection and classification in manet / Ahmad Yusri Dak
Published 2019“…The fourth stage is to design evaluation methodology of Max-Min Rule-Based Classification Algorithm using classifier model. …”
Get full text
Get full text
Thesis -
4
Analysis of WiMAX Positioning Using Received- Signal-Strength Method
Published 2013“…By the performance evaluation, the user can plan better simulation system and can create more accurate algorithms for radio positioning.…”
Get full text
Get full text
Get full text
Article -
5
Simulation model to improve QoS performance over fixed WiMAX using OPNET
Published 2013“…The design has been evaluated using the simulation tool OPNET modeler 16.0. …”
Get full text
Get full text
Article -
6
Reactive approach for automating exploration and exploitation in ant colony optimization
Published 2016“…The first component is a reactive max-min ant system algorithm for recording the neighborhood structures. …”
Get full text
Get full text
Get full text
Thesis -
7
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
Get full text
Get full text
Get full text
Article -
8
Single Fitness Function to Optimize Energy using Genetic Algorithms for Wireless Sensor Network
Published 2024journal::journal article -
9
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
10
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…This thesis is based on the application of sentiment classification algorithm to tweet data with the goal of classifying messages based on the polarity of sentiment towards a particular topic (or subject matter). …”
Get full text
Get full text
Get full text
Thesis -
11
Embedded Artificial Intelligent (AI) To Navigate Cart Follower
Published 2018“…The set of parameters used in traingd are lr, max_fail, min_grad, goal, time, and epochs. …”
Get full text
Get full text
Monograph -
12
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…In this paper, we propose an improvement of pattern growth-based PrefixSpan algorithm, called I-PrefixSpan. The general idea of I-PrefixSpan is to use the efficient data structure for general tree-like framework and separator database to reduce the execution time and memory usage. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
13
AI powered asthma prediction towards treatment formulation: an android app approach
Published 2022“…We utilized eight robust machine learning algorithms to analyze this dataset. We found that the Decision tree classifier had the best performance, out of the eight algorithms, with an accuracy of 87%. …”
Get full text
Get full text
Get full text
Article -
14
AI powered asthma prediction towards treatment formulation : An android app approach
Published 2022“…We utilized eight robust machine learning algorithms to analyze this dataset. We found that the Decision tree classifier had the best performance, out of the eight algorithms, with an accuracy of 87%. …”
Get full text
Get full text
Get full text
Article -
15
Optimization of hydropower reservoir system using genetic algorithm for various climatic scenarios
Published 2015“…Accordingly, different operation policies were constructed and evaluated in this research. Generally, this research is divided into two main stages. …”
Get full text
Get full text
Get full text
Thesis
