Search Results - (( developing adoption tree algorithm ) OR ( java implication based algorithm ))
Search alternatives:
- developing adoption »
- implication based »
- java implication »
- tree algorithm »
- adoption tree »
-
1
Improved Boosting Algorithms by Pre-Pruning and Associative Rule Mining on Decision Trees for predicting Obstructive Sleep Apnea
Published 2017“…The Pruned-Associative-Rule-Mined Decision Trees (PARM-DT) developed by adopting pre-pruning techniques on tree depth, minimum leaf and/or parent node size observations and maximum number of tree splits, based on Apriori and/or Adaptive Apriori (AA) frameworks, is boosted to achieve better predictive accuracies. …”
Get full text
Get full text
Get full text
Article -
2
Phylogenetic tree classification system using machine learning algorithm
Published 2015“…A study is conducted to develop an automated phylogenetic tree image classification system by using machine learning algorithm. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
3
Developing emergency application for LRT passengers with decision tree algorithm (RailAlert!) / Ezrren Natasha Baddru’l-Sham … [et al.]
Published 2023“…With geolocation and decision tree algorithms, this project aims to design and develop an emergency application for LRT passengers. …”
Get full text
Get full text
Book Section -
4
Developing emergency application for LRT passengers with decision tree algorithm (RailAlert!) / Ezrren Natasha Baddru’l-Sham … [et al.]
Published 2023“…With geolocation and decision tree algorithms, this project aims to design and develop an emergency application for LRT passengers. …”
Get full text
Get full text
Book Section -
5
Cancer Prediction Based On Data Mining Using Decision Tree Algorithm
Published 2022Get full text
Get full text
Undergraduates Project Papers -
6
An optimized attack tree model for security test case planning and generation
Published 2018“…Given the huge risks web applications face due to incessant cyberattacks, a proactive risk strategy such as threat modeling is adopted. It involves the use of attack trees for identifying software vulnerabilities at the earliest phase of software development which is critical to successfully protect these applications. …”
Get full text
Get full text
Article -
7
-
8
Improving performance of automated coronary arterial tree center-line extraction, stent localization and tracking
Published 2012“…Over the last decade, many algorithms have been developed to address this problem. …”
Get full text
Get full text
Thesis -
9
Image Based Oil Palm Tree Crowns Detection
Published 2020“…This system adopting some features from existing work to identify the ideas and methods that indicate the exact position and detecting the oil palm tree crowns on the acquired images. …”
Get full text
Get full text
Final Year Project Report / IMRAD -
10
-
11
Prediction of employee promotion using hybrid sampling method with machine learning architecture / Shahidan Shafie, Soek Peng Ooi and Khai Wah Khaw
Published 2023“…In this study, there are eight machine learning algorithms have been used, such as Logistic Regression, Decision Tree, Random Forest, K-Nearest Neighbors, Support Vector Machine, Naïve Bayes, Adaptive Boosting Classifier, and Extreme Gradient Boost. …”
Get full text
Get full text
Get full text
Article -
12
Monitoring Trends of Land Use and Land Cover Changes in Rajang River Basin
Published 2020“…Supervised classification with the MaximumLikelihood-Algorithm technique was adopted for monitoring the LULC changes using Geographic Information System (GIS) and ERDAS Imagine tools. …”
Get full text
Get full text
Conference or Workshop Item -
13
Determination of tree stem volume : A case study of Cinnamomum
Published 2013“…Modelling of trees has attracted scientific research in various fields and disciplines since trees and forests play very important roles in the global system. …”
Get full text
Get full text
Get full text
Thesis -
14
Testing the use of machine learning for heritage property valuation / Junainah Mohamad, Nur Shahirah Ja’afar and Suriatini Ismail
Published 2021“…Several machine learning algorithms have been developed and tested, including random forest regressor, decision tree regressor, lasso, ridge and, linear regression. …”
Get full text
Get full text
Conference or Workshop Item -
15
Performance evaluation of intrusion detection system using selected features and machine learning classifiers
Published 2021“…These evolutionary-based algorithms are known to be effective in solving optimization problems. …”
Get full text
Get full text
Article -
16
Diamond price prediction using random forest algorithm / Nur Amirah Mohd Azmi
Published 2025“…Traditional methods struggle to model these complexities effectively, necessitating adoption of advanced algorithms to improve accuracy. …”
Get full text
Get full text
Thesis -
17
Development of a modified adaptive protection scheme using machine learning technique for fault classification in renewable energy penetrated transmission line
Published 2020“…The Random Tree standalone ML-AP relay model presented the best performing models from the ML-APS relay model with the best average performance for the correctly classified fault types of 97.61 % at 5 % significance level above other ML algorithms. …”
Get full text
Get full text
Thesis -
18
Digital Quran With Storage Optimization Through Duplication Handling And Compressed Sparse Matrix Method
Published 2024thesis::doctoral thesis -
19
Classification models for higher learning scholarship award decisions
Published 2018“…A dataset of successful and unsuccessful applicants was taken and processed as training data and testing data used in the modelling process. Five algorithms were employed to develop a classification model in determining the award of the scholarship, namely J48, SVM, NB, ANN and RT algorithms. …”
Get full text
Get full text
Get full text
Article -
20
Anomaly detection in network traffic using machine learning
Published 2026“…The study objective is to analyze the effectiveness and reliability of implementing machine learning techniques in identifying anomalies in network traffic. Five (5) algorithms, which are Adaptive Boosting (AdaBoost), K-Nearest Neighbor (KNN), Random Forest (RF), Multi-Layer Perceptron (MLP), and Decision Trees (ID3) are systematically evaluated using the dataset CICIDS2017, a comprehensive and widely adopted benchmark for network traffic detection research. …”
Get full text
Get full text
Get full text
Article
