Search Results - (( java application tree algorithm ) OR ( using reflective method algorithm ))
Search alternatives:
- reflective method »
- java application »
- application tree »
- using reflective »
- method algorithm »
- tree algorithm »
-
1
-
2
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
Get full text
Get full text
Get full text
Article -
3
Retrieval Of Environmental Parameters Over Water Areas Using MODIS Data
Published 2012“…The presence of sediment reflectance in the MODIS imagery not only saturate the ocean color channels, but also enhance the reflectance of near infrared channels used in the atmospheric correction algorithm. …”
Get full text
Get full text
Thesis -
4
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
5
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…This thesis is based on the application of sentiment classification algorithm to tweet data with the goal of classifying messages based on the polarity of sentiment towards a particular topic (or subject matter). …”
Get full text
Get full text
Get full text
Thesis -
6
Evaluation of lightning current and ground reflection factor using measured electromagnetic field
Published 2014“…In order to validate the proposed method, a set of measured electromagnetic fields are used as the input parameters for the proposed algorithm. …”
Get full text
Get full text
Article -
7
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…In this paper, we propose an improvement of pattern growth-based PrefixSpan algorithm, called I-PrefixSpan. The general idea of I-PrefixSpan is to use the efficient data structure for general tree-like framework and separator database to reduce the execution time and memory usage. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
8
AI powered asthma prediction towards treatment formulation: an android app approach
Published 2022“…We utilized eight robust machine learning algorithms to analyze this dataset. We found that the Decision tree classifier had the best performance, out of the eight algorithms, with an accuracy of 87%. …”
Get full text
Get full text
Get full text
Article -
9
-
10
Prediction of Total Suspended Sediments in Penang Waters Using Remote Sensing
Published 2004“…Initially, digital number (DN) of imagery was corrected and converted into reflectance values for algorithm development. Subsequently combinations of various radiometric correction methods were used in this study to reduce the errors from various sources prior to statistical analysis. …”
Get full text
Get full text
Thesis -
11
AI powered asthma prediction towards treatment formulation : An android app approach
Published 2022“…We utilized eight robust machine learning algorithms to analyze this dataset. We found that the Decision tree classifier had the best performance, out of the eight algorithms, with an accuracy of 87%. …”
Get full text
Get full text
Get full text
Article -
12
Method of Moment Analysis Using Open-Ended Coaxial Sensor in Determination of Corn Reflection Coefficient
Published 2010“…So finally, their algorithms are easily programmable on computer. The computation of reflection coefficient of the corn was programmed using MATLAB software for the admittance approach and Method of Moment (MOM). …”
Get full text
Get full text
Thesis -
13
Development of a new algorithm for segmentation of flotation froth images
Published 2014“…The developed algorithm is validated using some froth images captured at different operating conditions, so the results indicate that the method can segment the mixture of big and small bubbles effectively.…”
Get full text
Get full text
Article -
14
A Study Of Salting Method for Image Protection
Published 2013“…This study will review various algorithm to be used in securing the password, including password hashing algorithms MD5 and SHA-1, along with types of commonly used attack for this type of situation. …”
Other -
15
Classification and detection of intelligent house resident activities using multiagent
Published 2013Get full text
Get full text
Get full text
Conference or Workshop Item -
16
A novel peak load shaving algorithm for isolated microgrid using hybrid PV-BESS system
Published 2021“…The simulation results demonstrate that the algorithm can minimize the limitations of the existing methods and it can use the PV generation system effectively. …”
Get full text
Get full text
Article -
17
Near Real Time Processing of NOAA AVHRR Satellite Data
Published 1998“…There are five cloud masking techn iques namely gross cloud check, spatial coherence method, dynamic visible and near infrared method, ratio of near infrared reflectance to visible reflectance and channel difference method have been implemented. …”
Get full text
Get full text
Thesis -
18
-
19
Classification of Diabetes Mellitus using Ensemble Algorithms
Published 2021“…Data mining and machine learning techniques can be extremely useful in classification of DM considering the need to have a shift from current traditional methods which use sharp needles to draw blood towards a non - invasive method. …”
Get full text
Get full text
Conference or Workshop Item -
20
Exploring frogeye leaf spot disease severity in soybean through hyperspectral data analysis and machine learning with Orange Data Mining
Published 2025“…Materials and Methods: We used hyperspectral reflectance data from healthy and FLS of soybeans. …”
Get full text
Get full text
Get full text
Article
