Search Results - (( developing challenges tree algorithm ) OR ( java implication based algorithm ))

Refine Results
  1. 1

    A novel steganography algorithm using edge detection and MPC algorithm by Aref Rezaei, Leili Farzinvash, Ali Farzamnia

    Published 2019
    “…With the rapid development of the Internet, preserving the security of confidential data has become a challenging issue. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2
  3. 3

    An Efficient Data Structure for General Tree-Like Framework in Mining Sequential Patterns Using MEMISP by Saputra, Dhany, Rambli, Dayang R.A., Foong, Oi Mean

    Published 2007
    “…It has been shown that MEMISP algorithm has outperformed all other algorithms in terms of efficiency and scalability. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    Novel approach for IP-PBX denial of service intrusion detection using support vector machine algorithm by Jama, Abdirisaq M., Khalifa, Othman Omran, Subramaniam, Nantha Kumar

    Published 2021
    “…In this research, Support Vector Machine (SVM) machine learning detection & prevention algorithm were developed to detect this type of attacks Two other techniques were benchmarked decision tree and Naïve Bayes. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Decision tree as knowledge management tool in image classification by Kusrini, , Harjoko, Agus

    Published 2008
    “…Expert System has been grown so fast as a science that study how to make computer capable of solving problems that typically can only be solved by expert.It has been realized that the biggest challenge of developing expert system is the process include expert’s knowledge into the system.This research tries to model expert’s knowledge management using case based reasoning method.The knowledge itself is not inputted directly by the expert, but rather the system will learn the knowledge from what the expert did to the previous cases.This research takes image classification as the problem to be solved.As the knowledge development technique, we build decision tree by using C4.5 algorithm.Variables used for building the decision tree are the image visual features.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    Optimized tree-classification algorithm for classification of protein sequences by Iqbal, M.J., Faye, I., Said, A.M., Belhaouari Samir, B.

    Published 2016
    “…The existing classification methods are performing well on a very limited data; however the rapid increase in the genomic data leads to the development of improved computational methods. In this work, we have proposed an optimized tree-classification technique which uses cluster k nearest neighbor classification algorithm to classify protein sequences into superfamilies. …”
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    Optimized tree-classification algorithm for classification of protein sequences by Iqbal, M.J., Faye, I., Said, A.M., Belhaouari Samir, B.

    Published 2016
    “…The existing classification methods are performing well on a very limited data; however the rapid increase in the genomic data leads to the development of improved computational methods. In this work, we have proposed an optimized tree-classification technique which uses cluster k nearest neighbor classification algorithm to classify protein sequences into superfamilies. …”
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    Framework for mining XML format business process log data by Ang, Jin Sheng

    Published 2024
    “…Therefore, a lot of frequent subtree mining (FSM) algorithms and methods were developed to get information from semi-structured data specifically data with hierarchical nature. …”
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10

    Prime-based method for interactive mining of frequent patterns by Nadimi-Shahraki, Mohammad-Hossein

    Published 2010
    “…The PC-tree is a well-organized tree structure, which is systematically built based on descendant making introduced in this study. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Investigating optimal smartphone placement for identifying stairs movement using machine learning by Muhammad Ruhul Amin, Shourov, Husman, Muhammad Afif, Toha, Siti Fauziah, Jasni, Farahiyah

    Published 2023
    “…However, gait patterns can vary significantly between individuals, making it challenging to develop a generalized algorithm for identifying incline surface human activity. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Sales prediction of religious product and services of Mutawwif Haramain Travel & Tours using predictive analytics by Mohd Sabri, Nurul Ainin Qistina

    Published 2025
    “…This research develops a predictive model for sales prediction at Mutawwif Haramain Travel & Tours, utilizing machine learning algorithms, specifically Decision Tree, Random Forest, and Naive Bayes, to uncover patterns in customer behavior and seasonal demand. …”
    Get full text
    Get full text
    Student Project
  13. 13

    Application of sampling-based motion planning algorithms in autonomous vehicle navigation by Khaksar, Weria, Mohamed Sahari, Khairul Salleh, Tang, Sai Hong

    Published 2016
    “…One of the challenging research areas in autonomous vehicle is the development of an intelligent motion planner, which is able to guide the vehicle in dynamic changing environments. …”
    Get full text
    Get full text
    Get full text
    Book Section
  14. 14
  15. 15
  16. 16

    Developing an app for streamlined inventory tracking with barcode scanning and load planning optimization by Teng, Yan Xin

    Published 2025
    “…Keywords: Inventory Management, Barcode Scanning, Load Planning, Binary Tree Bin Packing Algorithm, Mobile Application Development. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  17. 17

    Enhanced dynamic security assessment for power system under normal and fake tripping contingencies. by A. Salih, Qusay

    Published 2019
    “…The hybrid logistic model tree (hybrid LMT) approach proposed in this study combines the symmetrical uncertainties (SU) algorithm and the logistic model tree (LMT) algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    Drone-based surveillance of palm tress ecosystems by Mansor, Ya’akob, Baki, Sharudin Omar, Sahwee, Zulhilmy, Mengyue, Cheng, Wu, Yuanyuan

    Published 2024
    “…The study aims to improve the accuracy and efficiency of palm health detection by integrating MATLAB's initial object recognition with advanced deep learning algorithms. The initial phase of the research focuses on elucidating the challenges associated with detecting palm tree health issues using conventional image processing methods in MATLAB. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Enhancement of medical image compression algorithm in noisy WLANS transmission by Algaet, Mustafa Almahdi

    Published 2018
    “…Advances in telemedicine technology enable rapid medical diagnoses with visualization and quantitative assessment by medical practitioners.In healthcare and hospital networks,medical data exchange-based wireless local area network (WLAN) transceivers remain challenging because of their growing data size,real-time contact with compressed images,and range of bandwidths requiring transmission support.Prior to transmission,medical data are compressed to minimize transmission bandwidth and save transmitting power.Researchers address many challenges in improving performance of compression approaches.Such challenges include energy compaction, computational complexity,high entropy value,drive low compression ratio (CR) and high computational complexity in real-time implementation.Thus,a new approach called Enhanced Independent Component Analysis (EICA) for medical image compression has been developed to boost compression techniques;which transform the image data by block-based Independent Component Analysis (ICA).The proposed method uses Fast Independent Component Analysis (FastICA) algorithm followed by developed quantization architecture based zero quantized coefficients percentage (ZQCP) prediction model using artificial neural network. …”
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    Evaluating Machine Learning Algorithms for Fake Currency Detection by Keerthana, S.N, Chitra, K.

    Published 2024
    “…In this study, we evaluate the effectiveness of six supervised machine learning algorithms—K-Nearest Neighbor, Decision Trees, Support Vector Machine, Random Forests, Logistic Regression, and Naive Bayes—in detecting the authenticity of banknotes. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article