Search Results - (( data deviation tree algorithm ) OR ( java implementation path algorithm ))
Search alternatives:
- java implementation »
- implementation path »
- data deviation »
- deviation tree »
- tree algorithm »
- path algorithm »
-
1
Heavy Transportation Shortest Route using Dijkstra’s algorithm (HETRO) / Nurul Aqilah Ahmad Nezer
Published 2017“…The development tools used in developing this project is NetBeans by using Java for the implementation of the coding. The methodology that used for developing this system is the Dijkstra’s algorithm. …”
Get full text
Get full text
Thesis -
2
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…BST inserts the nodes in the way that the Dijkstra’s can find the empty parking in fastest way. Dijkstra’s algorithm initials the paths to finding the shortest path while ACO optimizes the paths. …”
Get full text
Get full text
Thesis -
3
Path planning for unmanned aerial vehicle (UAV) using rotated accelerated method in static outdoor environment
Published 2021“…In this study, a fast iterative method known as Rotated Successive Over-Relaxation (RSOR) is introduced. The algorithm is implemented in a self-developed 2D Java tool, UAV Planner. …”
Get full text
Get full text
Get full text
Get full text
Article -
4
Smart appointment organizer for mobile application / Mohd Syafiq Adam
Published 2009“…The main component of this prototype is the use of Dijkstra algorithm to compute the shortest path from source of appointment to the 6 points of destinations within UiTM Shah Alam. …”
Get full text
Get full text
Thesis -
5
The effect of different distance measures in detecting outliers using clustering-based algorithm for circular regression model
Published 2017“…Then, a stopping rule for the cluster tree based on the mean direction and circular standard deviation of the tree height is proposed. …”
Get full text
Get full text
Get full text
Article -
6
Comparative study of clustering-based outliers detection methods in circular-circular regression model
Published 2021“…A stopping rule for the cluster tree based on the mean direction and circular standard deviation of the tree height was used as the cutoff point and classifier to the cluster group that exceeded the stopping rule as potential outliers. …”
Get full text
Get full text
Get full text
Article -
7
Comparative study of clustering-based outliers detection methods in circularcircular regression model
Published 2021“…A stopping rule for the cluster tree based on the mean direction and circular standard deviation of the tree height was used as the cutoff point and classifier to the cluster group that exceeded the stopping rule as potential outliers. …”
Get full text
Get full text
Get full text
Article -
8
Comparative study of clustering-based outliers detection methods in circular-circular regression model
Published 2021“…A stopping rule for the cluster tree based on the mean direction and circular standard deviation of the tree height was used as the cutoff point and classifier to the cluster group that exceeded the stopping rule as potential outliers. …”
Get full text
Get full text
Get full text
Article -
9
Three-dimension coronary artery tree curvature confirmation
Published 2010“…We propose to use the standard deviation technique to compare the output features of the 3D coronary artery trees. …”
Get full text
Get full text
Get full text
Article -
10
Footwear quality evaluation using decision tree and logistic regression models
Published 2022“…The analysis showed that Decision Tree with Gini algorithm (three branches) in the first method prevails against the other methods with misclassification rate of 0.1307. …”
Get full text
Get full text
Thesis -
11
Analysis of short term load forecasting techniques / Tan Vy Luoh
Published 2019“…In this report, three common numerical STLF techniques including Multiple Linear Regression (MLR), Curve Fitting and Bagged Tree Regression are proposed to forecast one-day ahead load profile with a yearly historical load data. …”
Get full text
Get full text
Get full text
Thesis -
12
Parameter estimation and outlier detection for some types of circular model / Siti Zanariah binti Satari
Published 2015“…Then, a stopping rule for the cluster tree based on the mean direction and circular standard deviation of the tree height is proposed. …”
Get full text
Get full text
Thesis -
13
A hybrid interpretable deep structure based on adaptive neuro‑fuzzy inference system, decision tree, and K‑means for intrusion detection
Published 2022“…The proposed algorithm was trained, validated, and tested on the NSL-KDD (National security lab–knowledge discovery and data mining) dataset. …”
Get full text
Get full text
Get full text
Get full text
Article -
14
Implementation of machine learning algorithms for streamflow prediction of Dokan dam
Published 2023“…This study aims at comparing the application of deep learning algorithms and conventional machine learning algorithms for predicting reservoir inflow. …”
text::Thesis -
15
-
16
Identifying multiple outliers in linear functional relationship model using a robust clustering method
Published 2023“…A new robust cut-off point using the median and median absolute deviation for the tree heights to classify the potential outliers are proposed in this study. …”
Get full text
Get full text
Get full text
Article -
17
Enhanced Adaptive Neuro-Fuzzy Inference System Classification Method for Intrusion Detection
Published 2024“…On the KDDTest+ dataset, the proposed method also outperforms single CART and ANFIS in terms of various metrics other than precision. Since the CART tree is a binary tree, it can only represent the relationship between data through a split based on a single attribute at a single tree node. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
18
Evolutionary cost-cognizant regression test case prioritization for object-oriented programs
Published 2019“…Therefore, this study proposed a cost-cognizant TCP approach for object-oriented software that uses path-based integration testing to identify the possible execution path extracted from the Java System Dependence Graph (JSDG) model of the source code using forward slicing technique. …”
Get full text
Get full text
Thesis -
19
-
20
An improved hybrid learning approach for better anomaly detection
Published 2011“…Therefore, anomaly detection is often associated with high false alarm with only moderate accuracy of detection rates. In recent years, data mining approach for intrusion detection have been proposed and used such as neural networks, clustering, genetic algorithms, decision trees, and support vector machines. …”
Get full text
Get full text
Thesis
