Search Results - (( developing function using algorithm ) OR ( system implementation tree algorithm ))
Search alternatives:
- system implementation »
- developing function »
- implementation tree »
- using algorithm »
- tree algorithm »
-
1
Detecting Remote-To-Local (R2L) attack using Decision Tree algorithm / Ahmad Nasreen Aqmal Mohd Nordin
Published 2024“…The implementation phase focuses on the deployment of the Decision Tree algorithm and system evaluation through functionality testing. …”
Get full text
Get full text
Thesis -
2
Online Clothing Shopbots via Web Content Extraction / Nurul Syazwani Ramzi
Published 2017“…An algorithm vision based page segmentation algorithm will be implemented in this system to extract the data from multiple websites and will be displayed in new website. …”
Get full text
Get full text
Thesis -
3
-
4
Car dealership web application
Published 2022“…Tree SHAP, which was implemented by third-party SHAP Python library, were used in model monitoring and made the models interpretable. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
5
Developing an app for streamlined inventory tracking with barcode scanning and load planning optimization
Published 2025“…The application was implemented using React Native for mobile development and Firebase Firestore as the backend database to enable real-time data synchronization, while a binary tree bin packing algorithm was applied to generate efficient cargo loading arrangements. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
A study on component-based technology for development of complex bioinformatics software
Published 2004“…The second layer uses discriminative SVM algorithm with a state-of-the-art string kernel based on PSI-BLAST profiles that is used to leverage the unlabeled data. …”
Get full text
Get full text
Monograph -
7
Disparity map algorithm for stereo matching process using local based method
Published 2022“…In this research, two standard online benchmarking database systems are used to measure the accuracy of the proposed algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
8
Crown counting and mapping of missing oil palm tree using airborne imaging system
Published 2019“…The overall accuracy of counting existing oil palm trees using the approach developed in this study is 93.3% while missing trees detection gives the detection accuracy of 89.2%. …”
Get full text
Get full text
Thesis -
9
Modeling of Functional Electrical Stimulation (FES): Powered Knee Orthosis (PKO) assisted gait exercise in post-stroke rehabilitation / Adi Izhar Che Ani
Published 2023“…In the human gait model, three Machine Learning algorithms were used: Gaussian Process Regression, Support Vector Machine, and Decision Tree. …”
Get full text
Get full text
Thesis -
10
Development of a modified adaptive protection scheme using machine learning technique for fault classification in renewable energy penetrated transmission line
Published 2020“…The hybrid Wavelet Multiresolution Analysis and Machine learning algorithm (WMRA-ML) is used to extracts the useful hidden knowledge from decomposed one-cycle fault transient signals (voltage & current) from four Matlab/Simulink CIGRE models. …”
Get full text
Get full text
Thesis -
11
Drone-based surveillance of palm tress ecosystems
Published 2024“…Furthermore, the loss graph exhibits a similar trend to the RMSE graph, corroborating the effectiveness of RMSE as a common loss function for regression problems. Overall, this research contributes to the advancement of oil palm tree health detection systems, providing valuable insights for future developments in agricultural surveillance and monitoring technologies.…”
Get full text
Get full text
Get full text
Article -
12
Terahertz sensing analysis for early detection of ganoderma boninense disease using near infrared (NIR) spectrometer
Published 2023“…A portable smart G. boninense detection system prototype is developed by implementing the Internet of Things (IoT) into the system which enables the integration of sensors and server to perform prediction of healthy or infected oil palm seedlings. …”
Get full text
Get full text
Thesis -
13
Oral Dictionary
Published 2006“…Since the output speed is critical, binary search tree algorithm is chosen as best data structure to be implemented in this application to improve the searching time performance. …”
Get full text
Get full text
Final Year Project -
14
Diagnosis and recommender system for diabetes patient using decision tree / Nurul Aida Mohd Zamary
Published 2024“…The phase of this project is divided into data preprocessing, implementation of the decision tree algorithm, and evaluation of the algorithm and prototype. …”
Get full text
Get full text
Thesis -
15
Network instrusion prevention system ( NIPS) based on network intrusion detection system (NIDS) and ID3 algorithm decision tree classifier
Published 2011“…Network security has gained significant attention in research and industrial communities.Due to the increasing threat of the network intrusion,firewalls have become important elements of the security policy.Firewall performance highly depends toward number of rules,because the large more rules the consequence makes downhill performance progressively.Firewall can be allow or deny access network packets incoming and outgoing into Local Area Network(LAN),but firewall can not detect intrusion.To distinguishing an intrusion network packet or normal is very difficult and takes a lot of time.An analyst must review all the network traffics previously.In this study,a new way to make the rules that can determine network packet is intrusion or normal automatically.These rules implemented into firewall as prevention,which if there is a network packet that match these rules then network packet will be dropped.This is called Network Intrusion Prevention System(NIPS).These rules are generated based on Network Intrusion Detection System(NIDS)and Iterative Dichotomiser 3 (ID3)Algorithm Decision Tree Classifier,which as data training is intrusion network packet and normal network packets from previous network traffics.The experiment is successful,which can generate the rules then implemented into a firewall and drop the intrusion network packet automatically.Moreover,this way can minimize number of rules in firewall.…”
Get full text
Get full text
Thesis -
16
Selection, generation and extraction of MCCTree using XMCCTree
Published 2012Get full text
Get full text
Get full text
Article -
17
SRPTackle: a semi-automated requirements prioritisation technique for scalable requirements of software system projects
Published 2021“…Context: Requirement prioritisation (RP) is often used to select the most important system requirements as perceived by system stakeholders. …”
Get full text
Get full text
Get full text
Article -
18
A semi-automated requirements prioritisation technique for scalable requirements with stakeholder quantification and prioritisation
Published 2019“…Furthermore, the proposed SRPTackle is based on the combination of the proposed StakeQP technique, the constructed requirement priority value formulation function and the employing of classifying algorithm (K-means and K-means++) and binary search tree. …”
Get full text
Get full text
Thesis -
19
Optimizing tree planting areas through integer programming and improved genetic algorithm
Published 2012“…In conclusion, the hybrid algorithm based solution strategies improved efficiency with convincing results, therefore, this will assist planners for better decision making to optimize area to achieve more trees to be planted. …”
Get full text
Get full text
Thesis -
20
Partial Binary Tree Network (Pbtn): A New Dynamic Element Matching (Dem) Approach To Current Steering Digital Analog Converter (Dac)
Published 2014“…In this research, a new DEM algorithm is proposed on Current-Steering DACs with Partial Binary Tree Network (PBTN) algorithm to overcome glitches transitions with low complexity. …”
Get full text
Get full text
Thesis
