Search Results - (( developing 2 ((tree algorithm) OR (new algorithm)) ) OR ( java application using algorithm ))
Search alternatives:
- java application »
- using algorithm »
- tree algorithm »
- new algorithm »
- developing 2 »
-
1
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…The experimental result shows that using Java 2, this method improves the speed of PrefixSpan up to almost two orders of magnitude as well as the memory usage to more than one order of magnitude.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
2
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
3
Classification model for hotspot occurrences using spatial decision tree algorithm
Published 2013“…Empirical result demonstrates that the proposed algorithm can be used to join two spatial objects in constructing a spatial decision tree from a spatial dataset. …”
Get full text
Get full text
Get full text
Article -
4
Photogrammetric unmanned aerial vehicle for digital terrain model estimation under oil palm tree canopy area / Suzanah Abdullah
Published 2021“…It was found that WS algorithm recorded the lower RMSE value of 2.824m at 40m flying height, IWS algorithm obtained a lower RMSE value of 2.879m at 80m flying height, OBIA and SG algorithms obtained a lower RMSE value of 2.246m and 2.182m respectively at 100m flying height. …”
Get full text
Get full text
Thesis -
5
Outlier detection in circular regression model using minimum spanning tree method
Published 2019Get full text
Get full text
Conference or Workshop Item -
6
Fitness value based evolution algorithm approach for text steganalysis model
Published 2013“…In this paper, we present a new alternative method for text steganalysis based on an evolution algorithm, implemented using the Java Evolution Algorithms Package (JEAP).The main objective of this paper is to detect the existence of hidden messages ased on fitness values of a text description.It is found that the detection performance has been influenced by two groups of fitness values which are good fitness value and bad fitness value. …”
Get full text
Get full text
Article -
7
-
8
Text steganalysis using evolution algorithm approach
Published 2012“…This study presents a new alternative of steganalysis method in order to detect hidden messages in text steganalysis called Evolution Detection Steganalysis System (EDSS) based on the evolution algorithm approach under Java Genetic Algorithms Package (JGAP). …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
9
-
10
Selection, generation and extraction of MCCTree using XMCCTree
Published 2012Get full text
Get full text
Get full text
Article -
11
A Hybrid Adaptive Leadership GWO Optimization with Category Gradient Boosting on Decision Trees Algorithm for Credit Risk Control Classification
Published 2024“…Thirdly, this study uses SHAP framework to improve the interpretability of the new algorithm (EBGWO-CatBoost), and solves the problem of the weak interpretability of the new algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
12
Security Analysis Between Static And Dynamic S-boxes In Block Ciphers
Published 2024Get full text
Article -
13
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…On the Construction phase, the development of the prototype has been started. All the algorithm for the engine has been developed by using Java script language. …”
Get full text
Get full text
Thesis -
14
Enhance efficiency of answering XML keyword query using incompact structure of MCCTree
Published 2012“…If the result cannot be used directly by the ranking method, the algorithm has an ineffective process. Moreover, if the ineffective process requires re-examining the original tree, the efficiency of the process of the algorithm will be reduced. …”
Get full text
Get full text
Thesis -
15
Face recognition and identification system (FaceRec) / Khew Jye Huei
Published 2004“…It describes the implementation and functions of a working system that performs the recognition and identification of human faces using the implement algorithms. Java is use as programming language to develop the Face Rec system and Microsoft Access as the database to store and access the fa e images for the training set. …”
Get full text
Get full text
Thesis -
16
-
17
A comparison of support vector machine and decision tree classifications using satellite data of Langkawi Island
Published 2009“…This study investigates a new approach in image classification. Two classifiers were used to classify SPOT 5 satellite image; Decision Tree (DT) and Support Vector Machine (SVM). …”
Get full text
Get full text
Get full text
Article -
18
A new mobile botnet classification based on permission and API calls
Published 2024Conference Paper -
19
-
20
