Search Results - (( java application customization algorithm ) OR ( based content tree algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5

    Prime-based method for interactive mining of frequent patterns by Nadimi-Shahraki, Mohammad-Hossein

    Published 2010
    “…The PC-tree is a well-organized tree structure, which is systematically built based on descendant making introduced in this study. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Content-based recommender system for an academic social network / Vala Ali Rohani by Vala Ali, Rohani

    Published 2014
    “…The content-based method is employed more widely though. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Online Clothing Shopbots via Web Content Extraction / Nurul Syazwani Ramzi by Ramzi, Nurul Syazwani

    Published 2017
    “…These block tree is constructed by using DOM (document object model) tree. …”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9

    An improved framework for content and link-based web spam detection: a combined approach by Shahzad, Asim

    Published 2021
    “…The content-based web spam detection framework uses three proposed and two improved content-based algorithms for web spam detection. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11

    Delineating mangrove forest zone using spectral reflectance by Abdul Whab @ Abdul Wahab,, Zulfa

    Published 2020
    “…Species identification with spectral library derived from in-situ measurements using SID algorithm and derived from Landsat 8 using SAM algorithm was done. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Performance analysis of machine learning algorithms for classification of infection severity levels on rubber leaves by Mat Lazim, Siti Saripa Rabiah, Sulaiman, Zulkefly, Mat Nawi, Nazmi, Mohd Mustafah, Anas

    Published 2023
    “…At the early infection stage, it is very difficult to diagnose the disease because infected trees do not exhibit any symptoms. Thus, this study was carried out to investigate the potential application of spectroscopic technology and machine learning algorithms to classify severity level of infected trees at early stage based on spectral data. …”
    Get full text
    Get full text
    Get full text
    Book Section
  13. 13
  14. 14

    Intelligent cooperative web caching policies for media objects based on J48 decision tree and Naive bayes supervised machine learning algorithms in structured peer-to-peer systems by Ibrahim, Hamidah, Yasin, Waheed, Udzir, Nur Izura, Abdul Hamid, Nor Asilah Wati

    Published 2016
    “…In this work, intelligent cooperative web caching approaches based on J48 decision tree and Naïve Bayes (NB) supervised machine learning algorithms are presented. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Modelling complex features from histone modification signatures using genetic algorithm for the prediction of enhancer region by Lee, Nung Kion, Fong, Pui Kwan, Mohd Tajuddin, Abdullah

    Published 2014
    “…Using Genetic Algorithm, this paper presents a modelling method to generate novel logical-based features from DNA sequences enriched with H3K4mel histone signatures. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16
  17. 17
  18. 18

    Detecting video spammers in YouTube social media by Yusof, Yuhanis, Sadoon, Omar Hadeb

    Published 2017
    “…Even though the detection of malicious users is based on various features such as content details, social activity, social network analyzing, or hybrid, the detection rate is still considered low (i.e. 46%).This study proposes a new set of features by constructing features based on the Edge Rank algorithm.Experiments were performed using nine classifiers of different learning; decision tree, function-based and Bayesian. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Content-based indexing of low resolution documents by Md Nor, Danial

    Published 2016
    “…To build an indexed structure for fast and high quality content-based retrieval of an image, some existing representative signatures and the key indexes used have been revised. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis