Search Results - (( developing spatial tree algorithm ) OR ( java implementation level algorithm ))

Refine Results
  1. 1

    Classification model for hotspot occurrences using spatial decision tree algorithm by Sitanggang, Imas Sukaesih, Yaakob, Razali, Mustapha, Norwati, Nuruddin, Ahmad Ainuddin

    Published 2013
    “…Empirical result demonstrates that the proposed algorithm can be used to join two spatial objects in constructing a spatial decision tree from a spatial dataset. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Extended spatial decision tree algorithm for classifying hotspot occurrence by Sitanggang, Imas Sukaesih

    Published 2013
    “…This work proposes a new spatial decision tree algorithm namely the extended spatial ID3 decision tree algorithm to classify hotspots occurrence from a forest fires dataset that contains point, line and polygon features. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Modeling forest fires risk using spatial decision tree by Yaakob, Razali, Mustapha, Norwati, Nuruddin, Ahmad Ainuddin, Sitanggang, Imas Sukaesih

    Published 2011
    “…This paper presents our initial work in developing a spatial decision tree using the spatial ID3 algorithm and Spatial Join Index applied in the SCART (Spatial Classification and Regression Trees) algorithm. …”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…The encryption algorithms are playing an important part in the protection level for data. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Semi-automatic oil palm tree counting from pleiades satellite imagery and airborne LiDAR / Nurul Syafiqah Khalid by Khalid, Nurul Syafiqah

    Published 2020
    “…This study aimed to develop the automatic oil palm tree counting using remote sensed data and two different algorithms at Felda Pasoh. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Classification of tropical rainforest using different classification algorithm based on remote sensing imagery: A study of Gunung Basor by Intan Noradybah Md Rodi

    Published 2019
    “…The area is a high potential growing region for different tree species. The main objectives is to develop a forest tree recognition techniques and build a classification strategy for forest tree area segmentation. …”
    Get full text
    Get full text
    Undergraduate Final Project Report
  8. 8

    Evaluation of tree growth characteristics of harum manis mango from multitemporal UAV image in plantation farm by Muhammad Yusuf, Akmal Alif

    Published 2022
    “…The contribution of this study is to produce Canopy Height Mapping (CHM) from difference multitemporal UAV data and characterization of mango tree develop using OBIA algorithm to monitoring development Harum Manis Tree. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Predictive models for hotspots occurrence using decision tree algorithms and logistic regression. by Sitanggang, Imas Sukaesih, Yaakob, Razali, Mustapha, Norwati, Nuruddin, Ahmad Ainuddin

    Published 2013
    “…This work applied the decision tree algorithms i.e., ID3 and C4.5, as well as logistic regression on spatial data of forest fires for Rokan Hilir District in Riau Province in Indonesia. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10
  11. 11
  12. 12

    Implementation of (AES) Advanced Encryption Standard algorithm in communication application by Moh, Heng Huong

    Published 2014
    “…Internet communication has become more common in this modern world recently, and one of the important algorithms used is ABS algorithm. However, most of the users have inadequate knowledge and understanding regard to this algorithm implementation in the communication field, as well as the level of security and accuracy will be questioned by the users because of the necessary to maintain the confidentiality of particular data transferred. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  13. 13

    Implementation of locust inspired scheduling algorithm with huge number of servers for energy efficiency in a cloud datacenter by Azhar, Nur Huwaina

    Published 2019
    “…It does not consider the LACE algorithm implemented in huge number of server in one Cloud datacenter. …”
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15

    Constructing routing tree for centralized scheduling using multi-channel single transceiver system in 802.16 mesh mode by Al-Hemyari, Ali, Ng, Chee Kyun, Noordin, Nor Kamariah, Ismail, Alyani, Khatun, Sabira

    Published 2008
    “…This paper proposes a centralized scheduling algorithm that can reduce interferences by constructing routing tree with multi-channel single transceiver system in WiMAX mesh networks. …”
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    A Model for Evaluation of Cryptography Algorithm on UUM Portal by Norliana, Abdul Majid

    Published 2004
    “…Level one is the development of userID and password, level two involve the insertion of the testing parameter speed coding. …”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application by Yana Aditia, Gerhana, Nur, Lukman, Arief Fatchul, Huda, Cecep Nurul, Alam, Undang, Syaripudin, Devi, Novitasari

    Published 2020
    “…Performance Testing is used to test the performance of algorithm implementations in applications. The test results show that the Boyer Moore and Knuth Morris Pratt algorithms have an accuracy rate of 100%, and the Horspool algorithm 85.3%. …”
    Get full text
    Get full text
    Journal
  18. 18

    An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe by Yakub Kayode, Saheed, Kazeem Alagbe, Gbolagade

    Published 2017
    “…We use a parallel technique that divides RSA power process into seperate threads and employs the use of Chinese Remainder Theorem (CRT) to decrease the time required for both encryption and decryption operation. Java programming language is used to implement the algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Classification model for hotspot occurrences using a decision tree method by Sitanggang, Imas Sukaesih, Ismail, Mohd Hasmadi

    Published 2011
    “…This work demonstrates the application of a decision tree algorithm, namely the C4.5 algorithm, to develop a classification model from forest fire data in the Rokan Hilir district, Indonesia. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Combining data mining algorithm and object-based image analysis for detailed urban mapping of hyperspectral images by Hamedianfar, Alireza, Mohd Shafri, Helmi Zulhaidi, Mansor, Shattri, Ahmad, Noordin

    Published 2014
    “…The images were used to explore the combined performance of a data mining (DM) algorithm and object-based image analysis (OBIA). A large number of attributes were discovered with the C4.5 DM algorithm, which also generated the classification model as a decision tree. …”
    Get full text
    Get full text
    Article