Search Results - (( developing mode tree algorithm ) OR ( java implication drops algorithm ))

  • Showing 1 - 17 results of 17
Refine Results
  1. 1
  2. 2

    Study On The Accuracy Of Tree’s Diameter Measurement By Laser Range Finder System by Mohd Rusdy, Yaacob, Miskon, Muhammad Fahmi, Chan, Xin Zhi

    Published 2014
    “…An algorithm was developed to derive the formula for calculating the diameter by applying the principle of circle tangent theory. …”
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    First Semester Computer Science Students’ Academic Performances Analysis by Using Data Mining Classification Algorithms by Azwa, Abdul Aziz, Fadhilah, Ahmad

    Published 2014
    “…From the experiment, the models develop using Rule Based and Decision Tree algorithm shows the best result compared to the model develop from the Naïve Bayes algorithm. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction by Dheyab, Saad Ahmed, Mohammed Abdulameer, Shaymaa, Mostafa, Salama A

    Published 2022
    “…It leads to network disturbances, interruption of communication and significant damage to services. Researchers seek to develop intelligent algorithms to detect and prevent DDoS attacks. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction by Dheyab, Saad Ahmed, Mohammed Abdulameer, Shaymaa, Mostafa, Salama A.

    Published 2022
    “…It leads to network disturbances, interruption of communication and significant damage to services. Researchers seek to develop intelligent algorithms to detect and prevent DDoS attacks. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction by Ahmed Dheyab, Saad, Mohammed Abdulameer, Shaymaa, Mostafa, Salama A

    Published 2022
    “…It leads to network disturbances, interruption of communication and significant damage to services. Researchers seek to develop intelligent algorithms to detect and prevent DDoS attacks. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction by Dheyab, Saad Ahmed, Mohammed Abdulameer, Shaymaa, Mostafa, Salama

    Published 2022
    “…It leads to network disturbances, interruption of communication and significant damage to services. Researchers seek to develop intelligent algorithms to detect and prevent DDoS attacks. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction by Dheyab, Saad Ahmed, Mohammed Abdulameer, Shaymaa, Mostafa, Salama

    Published 2023
    “…It leads to network disturbances, interruption of communication and significant damage to services. Researchers seek to develop intelligent algorithms to detect and prevent DDoS attacks. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Data mining for structural damage identification using hybrid artificial neural network based algorithm for beam and slab girder / Meisam Gordan by Meisam , Gordan

    Published 2020
    “…In the modeling phase, amongst all DM algorithms, the applicability of machine learning, artificial intelligence and statistical data mining techniques were examined using Support Vector Machine (SVM), Artificial Neural Network (ANN) and Classification and Regression Tree (CART) to detect the hidden patterns in vibration data. …”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    New Learning Models for Generating Classification Rules Based on Rough Set Approach by Al Shalabi, Luai Abdel Lateef

    Published 2000
    “…Recently, different models were used to generate knowledge from vague and uncertain data sets such as induction decision tree, neural network, fuzzy logic, genetic algorithm, rough set theory, and others. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Appliance level stand-by burst forecast modelling using machine learning techniques by Mustafa, Abid

    Published 2020
    “…The standby mode helps optimize electric power use yet it causes some power leakage. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Optimization and selection of maintenance policies in an electrical gas turbine generator based on the hybrid reliability-centered maintenance (RCM) model by Alrifaey, Moath, Hong, Tang Sai, As'arry, Azizan, Supeni, Eris Elianddy, Ang, Chun Kit

    Published 2020
    “…Hence, in the present study, a hybrid RCM model was proposed to fill these gaps and find the optimal maintenance policies and scheduling by a combination of hybrid linguistic-failure mode and effect analysis (HL-FMEA), the co-evolutionary multi-objective particle swarm optimization (CMPSO) algorithm, an analytic network process (ANP), and developed maintenance decision tree (DMDT). …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Development of reliability-centered maintenance model using linguistic failure mode and effect analysis by Mohammed Ahmed Qaid, Alrifaey Moath

    Published 2019
    “…An analytic network process (ANP) and a developed maintenance decision tree (DMDT) were used to find the optimal maintenance policy and schedule for every FMs. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Optimized scheme for efficient and scalable key management in IEEE 802.16e-based networks by Sadeghi, Mohammad Mehdi Gilanian

    Published 2015
    “…One of the trees is a binary tree data structure and the other is a B-tree data structure. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Data Mining Analysis Of Chronic Kidney Disease (CKD) Level by Mohd Harizi, Muhammad Hafizam Afiq

    Published 2022
    “…Data classifications are performed at a 10-fold-cross-validation mode using Naïve Bayes (NB), Support Vector Machine (SVM), and J48 Trees. …”
    Get full text
    Get full text
    Monograph
  16. 16

    Automatic detection and indication of pallet-level tagging from rfid readings using machine learning algorithms by Choong, Chun Sern

    Published 2020
    “…In order to further validate the position of the tagging in the pallet box of the Random Forest model developed, a different predefined location was used to validate the model. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Machine learning‐based approach for bandwidth and frequency prediction of circular SIW antenna by Alam, Md Mahabub, Nurhafizah, Abu Talip Yusof, Ahmad Afif, Mohd Faudzi, Tomal, Md Raihanul Islam, Haque, Md Ershadul, Rahman, Md. Suaibur

    Published 2025
    “…A predictive ML framework was developed using six regression algorithms trained on significant geometrical parameters, such as ring slot radius, via diameter, and feedline width. …”
    Get full text
    Get full text
    Get full text
    Article