Search Results - (( based detection tree algorithm ) OR ( java application optimisation algorithm ))

Refine Results
  1. 1

    The effect of different distance measures in detecting outliers using clustering-based algorithm for circular regression model by Nur Faraidah, Muhammad Di, Siti Zanariah, Satari

    Published 2017
    “…In this study, we proposed multiple outliers detection in circular regression models based on the clustering algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Comparative study of clustering-based outliers detection methods in circular-circular regression model by Siti Zanariah, Satari, Nur Faraidah, Muhammad Di, Yong Zulina, Zubairi, Abdul Ghapor, Hussin

    Published 2021
    “…This paper is a comparative study of several algorithms for detecting multiple outliers in circular-circular regression model based on the clustering algorithms. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…The system is essentially a three-part development, utilising Android, Java Servlets, and Arduino platforms to create an optimised and automated urban-gardening system. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    A novel steganography algorithm using edge detection and MPC algorithm by Aref Rezaei, Leili Farzinvash, Ali Farzamnia

    Published 2019
    “…In this paper, we propose an efficient steganography algorithm which applies edge detection and MPC algorithm for data concealment in digital images. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Novel approach for IP-PBX denial of service intrusion detection using support vector machine algorithm by Jama, Abdirisaq M., Khalifa, Othman Omran, Subramaniam, Nantha Kumar

    Published 2021
    “…For CICIDS dataset, SVM algorithm achieved highest detection rate of 76.47% while decision tree and Naïve Bayes has 63.71% & 41.58% of detection rate, respectively. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    A lower complexity K best algorithm for multiple input and multiple output detection by Jabir, Amjad Najim, Khatun, Sabira, Noordin, Nor Kamariah, Mohd Ali, Borhanuddin

    Published 2011
    “…This paper presents Multiple Input Multiple Output (MIMO) detection steps using tree search based method known as the ‘K’ best algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Comparative study of clustering-based outliers detection methods in circular-circular regression model by Siti Zanariah Satari, Nur Faraidah Muhammad Di, Yong Zulina Zubairi, Abdul Ghapor Hussin

    Published 2021
    “…This paper is a comparative study of several algorithms for detecting multiple outliers in circular-circular regression model based on the clustering algorithms. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Comparative study of clustering-based outliers detection methods in circularcircular regression model by Siti Zanariah, Satari, Nur Faraidah, Muhammad Di, Yong Zulina, Zubairi, Abdul Ghapor, Hussin

    Published 2021
    “…This paper is a comparative study of several algorithms for detecting multiple outliers in circular-circular regression model based on the clustering algorithms. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    A lower complexity k best algorithm for multiple input and multiple output detection by Jabir, Amjad N., Sabira, Khatun, Noordin, N. K., Ali, B. M.

    Published 2011
    “…This paper presents Multiple Input Multiple Output (MIMO) detection steps using tree search based method known as the ‘K’ best algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    E2IDS: an enhanced intelligent intrusion detection system based on decision tree algorithm by Bouke, Mohamed Aly, Abdullah, Azizol, ALshatebi, Sameer Hamoud, Abdullah, Mohd Taufik

    Published 2022
    “…The model design is Decision Tree (DT) algorithm-based, with an approach to data balancing since the data set used is highly unbalanced and one more approach for feature selection. …”
    Get full text
    Get full text
    Article
  11. 11

    Performance evaluation for different intrusion detection system algorithms using machine learning by Zarir, Mustafa Nadhim

    Published 2018
    “…The objectives of this project is to evaluate the performance of various intrusion detection algorithms based on machine learning. The algorithms considered are the Naive Bays Algorithm, Decision Tree Algorithm and Hybrid Algorithm for different datasets. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    Network instrusion prevention system ( NIPS) based on network intrusion detection system (NIDS) and ID3 algorithm decision tree classifier by Syurahbil, A

    Published 2011
    “…Network security has gained significant attention in research and industrial communities.Due to the increasing threat of the network intrusion,firewalls have become important elements of the security policy.Firewall performance highly depends toward number of rules,because the large more rules the consequence makes downhill performance progressively.Firewall can be allow or deny access network packets incoming and outgoing into Local Area Network(LAN),but firewall can not detect intrusion.To distinguishing an intrusion network packet or normal is very difficult and takes a lot of time.An analyst must review all the network traffics previously.In this study,a new way to make the rules that can determine network packet is intrusion or normal automatically.These rules implemented into firewall as prevention,which if there is a network packet that match these rules then network packet will be dropped.This is called Network Intrusion Prevention System(NIPS).These rules are generated based on Network Intrusion Detection System(NIDS)and Iterative Dichotomiser 3 (ID3)Algorithm Decision Tree Classifier,which as data training is intrusion network packet and normal network packets from previous network traffics.The experiment is successful,which can generate the rules then implemented into a firewall and drop the intrusion network packet automatically.Moreover,this way can minimize number of rules in firewall.…”
    Get full text
    Get full text
    Thesis
  13. 13

    Breast cancer disease classification using fuzzy-ID3 algorithm with FUZZYDBD method: automatic fuzzy database definition by Nur Farahaina, Idris, Mohd Arfian, Ismail

    Published 2021
    “…This paper proposed the fuzzy-ID3 (FID3) algorithm, a fuzzy decision tree as the classification method in breast cancer detection. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  14. 14
  15. 15

    Application Of Multi-Layer Perceptron Technique To Detect And Locate The Base Of A Young Corn Plant by Morshidi, Malik Arman

    Published 2007
    “…Another structure of MLP trained using backpropagation algorithm is used to detect and locate the base of the young corn tree using the skeleton of the segmented image. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Object-based imagery analysis for automatic urban tree species detection using high resolution satellite image by Shojanoori, Razieh

    Published 2016
    “…This study also explores the use and comparison of object-based classification, and two common pixel-based classification methods namely, maximum likelihood and support vector machines based on WorldView-2 satellite imagery to evaluate the potential of the object-based in compare to pixel-based to detect urban tree species. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Assesment of robust tree detection technique for inter row trees tracking UAV based on simultaneous localization method / Norashikin M. Thamrin and Nor Hashim Mohd. Arshad by M. Thamrin, Norashikin, Mohd. Arshad, Nor Hashim

    Published 2014
    “…Most of row tracking techniques were implemented on mobile robot and the method varies in terms of sensors and algorithm used for detection for example Global Positioning System (GPS), vision based, laser, mechanical sensors and sensor fusion. …”
    Get full text
    Get full text
    Research Reports
  18. 18

    Semi-automatic oil palm tree counting from pleiades satellite imagery and airborne LiDAR / Nurul Syafiqah Khalid by Khalid, Nurul Syafiqah

    Published 2020
    “…The study is to categorize and evaluates methods for automatic tree counting detection. For the methodology of this study, object-based image analysis (OBIA), watershed transformation segmentation and local maxima algorithm are applied. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Automatic detection of oil palm tree from UAV images based on the deep learning method by Xinni, Liu, Kamarul Hawari, Ghazali, Fengrong, Han, Izzeldin, I. Mohd

    Published 2021
    “…The model was then trained and used to detect individual oil palm tree based on data from the testing set. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Accuracy and performance analysis for classification algorithms based on biomedical datasets by Al-Hameli, Bassam Abdo, Alsewari, Abdulrahman A., Khubrani, Mousa, Fakhreldin, Mohammoud

    Published 2021
    “…Trees based Decision Tree (ID3) algorithm, Bayesian Theorem based Hidden Naïve Bayes (HNB) algorithm. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item