Search Results - (( develop complex ((rsa algorithm) OR (tree algorithm)) ) OR ( java implication based algorithm ))

Refine Results
  1. 1
  2. 2

    Improved Boosted Decision Tree Algorithms by Adaptive Apriori and Post-Pruning for Predicting Obstructive Sleep Apnea by Sim, Doreen Ying Ying, Teh, Chee Siong, Ahmad Izuanuddin, Ismail

    Published 2018
    “…The improved version of Boosted Decision Tree algorithm, named as Boosted Adaptive Apriori post-Pruned Decision Tree (Boosted AApoP-DT), was developed by referring to Adaptive Apriori (AA) properties and by using post-pruning technique. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Two-stage feature selection using ranking self-adaptive differential evolution algorithm for recognition of acceleration activity by Zainudin, Muhammad Noorazlan Shah, Sulaiman, Md. Nasir, Mustapha, Norwati, Perumal, Thinagaran, Mohamed, Raihani

    Published 2018
    “…Consequently, this paper proposes a ranking self-adaptive differential evolution (rsaDE) feature selection algorithm. The proposed algorithm is capable of selecting the optimal feature subsets while improving the recognition of acceleration activity using a minimum number of features. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Adaptive rapidly-exploring-random-tree-star (Rrt*) -Smart: algorithm characteristics and behavior analysis in complex environments by Jauwairia Nasir, Fahad Islam, Yasar Ayaz

    Published 2013
    “…Rapidly Exploring Random Trees (RRT) are regarded as one of the most efficient tools for planning feasible paths for mobile robots in complex obstacle cluttered environments. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    E2IDS: an enhanced intelligent intrusion detection system based on decision tree algorithm by Bouke, Mohamed Aly, Abdullah, Azizol, ALshatebi, Sameer Hamoud, Abdullah, Mohd Taufik

    Published 2022
    “…The model design is Decision Tree (DT) algorithm-based, with an approach to data balancing since the data set used is highly unbalanced and one more approach for feature selection. …”
    Get full text
    Get full text
    Article
  6. 6
  7. 7
  8. 8

    Decision tree and rule-based classification for predicting online purchase behavior in Malaysia / Maslina Abdul Aziz, Nurul Ain Mustakim and Shuzlina Abdul Rahman by Abdul Aziz, Maslina, Mustakim, Nurul Ain, Abdul Rahman, Shuzlina

    Published 2024
    “…The result indicated that the highest accuracy of 89.34% was achieved by the Random Tree algorithm, while the rule-based algorithm PART reached an accuracy of 87.56%. …”
    Get full text
    Get full text
    Article
  9. 9

    Modelling complex features from histone modification signatures using genetic algorithm for the prediction of enhancer region by Lee, Nung Kion, Fong, Pui Kwan, Mohd Tajuddin, Abdullah

    Published 2014
    “…Current histone signature is mostly represented using k-mers content features incapable of representing all the possible complex interactions of various DNA segments. The main contributions are, among others: (a) demonstrating that there are complex interactions among sequence segments in the histone regions; (b) developing a parse tree representation of the logical complex features. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10
  11. 11

    Optimized tree-classification algorithm for classification of protein sequences by Iqbal, M.J., Faye, I., Said, A.M., Belhaouari Samir, B.

    Published 2016
    “…The existing classification methods are performing well on a very limited data; however the rapid increase in the genomic data leads to the development of improved computational methods. In this work, we have proposed an optimized tree-classification technique which uses cluster k nearest neighbor classification algorithm to classify protein sequences into superfamilies. …”
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12

    Optimized tree-classification algorithm for classification of protein sequences by Iqbal, M.J., Faye, I., Said, A.M., Belhaouari Samir, B.

    Published 2016
    “…The existing classification methods are performing well on a very limited data; however the rapid increase in the genomic data leads to the development of improved computational methods. In this work, we have proposed an optimized tree-classification technique which uses cluster k nearest neighbor classification algorithm to classify protein sequences into superfamilies. …”
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13
  14. 14

    Framework for mining XML format business process log data by Ang, Jin Sheng

    Published 2024
    “…Therefore, a lot of frequent subtree mining (FSM) algorithms and methods were developed to get information from semi-structured data specifically data with hierarchical nature. …”
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16

    Quaternion-based dynamic algorithm for random generation of solid 4D cylindrical curves in RVE modeling by Hamat, Sanusi, Ishak, Mohamad Ridzwan, Kelly, Piaras, Salit, Mohd Sapuan, Yidris, Noorfaizal, Ali, Syamir Alihan Showkat, Hussin, Mohd Sabri, Mohd Dawi, Mohd Syedi Imran

    Published 2025
    “…A quaternion‐based dynamic algorithm is developed to populate Representative Volume Elements (RVEs) with solid 4D cylindrical fibers, combining spatial centerline coordinates (x,y,z) and quaternion‐encoded orientation. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Mobile Learning: An Application Prototype for AVL Tree Learning Object by Ibrahim, Mohammad Noor, Mahamad, Saipunidzam, Chua, Edrea Ning Wei

    Published 2010
    “…This project focuses on the design and development of an AVL tree learning object for tertiary students by utilizing current mobile phone features such as mobility, multimedia capability and connectivity. …”
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18
  19. 19

    Development of some fast and efficient methods for elliptic curve scalar multiplication over prime fields by Al-Saffar, Najlae Falah Hameed

    Published 2015
    “…Elliptic curve cryptosystem (ECC) is being used nowadays more than ever to fulfill the need for public key cryptosystem because of its ability to use shorter keys lengths and computationally more efficient algorithms than anther public key cryptosystems such as Rivest-Shamir- Adleman (RSA), Digital Signature Algorithm (DSA) and ElGamal. …”
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20