Search Results - (( java implementation modified algorithm ) OR ( basic decision tree algorithm ))
Search alternatives:
- implementation modified »
- java implementation »
- basic decision »
- tree algorithm »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
2
OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT
Published 2023“…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
Review -
3
-
4
Application Of Multi-Layer Perceptron Technique To Detect And Locate The Base Of A Young Corn Plant
Published 2007“…In this research, a vision system algorithm has been developed to identify and locate base of young corn trees based upon robot vision technology, pattern recognition techniques, and knowledge-based decision theory. …”
Get full text
Get full text
Thesis -
5
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
Get full text
Get full text
Thesis -
6
Automatic generation of content security policy to mitigate cross site scripting
Published 2016“…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
Get full text
Get full text
Conference or Workshop Item -
7
Twofold Integer Programming Model for Improving Rough Set Classification Accuracy in Data Mining.
Published 2005“…The accuracy for rules and classification resulted from the TIP method are compared with other methods such as Standard Integer Programming (SIP) and Decision Related Integer Programming (DRIP) from Rough Set, Genetic Algorithm (GA), Johnson reducer, HoltelR method, Multiple Regression (MR), Neural Network (NN), Induction of Decision Tree Algorithm (ID3) and Base Learning Algorithm (C4.5); all other classifiers that are mostly used in the classification tasks. …”
Get full text
Get full text
Thesis -
8
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis -
9
AnkPlex: algorithmic structure for refinement of near-native ankyrin-protein docking
Published 2017“…Subsequently, a re-scoring rank was generated by AnkPlex using a combination of a decision tree algorithm and logistic regression. AnkPlex achieved superior efficiency with ≥1 near-native complexes in the 10 top-rankings for nine X-ray complexes compared to ZDOCK, which only obtained six X-ray complexes. …”
Get full text
Get full text
Article -
10
Landslide Susceptibility Mapping with Stacking Ensemble Machine Learning
Published 2024“…One of the prominent methods to improve machine learning accuracy is by using ensemble method which basically employs multiple base models. In this paper, the stacking ensemble method is used to increase the accuracy of the machine learning model for LSM where the base (first-level) learners use five ML algorithms namely decision tree (DT), k-nearest neighbor (KNN), AdaBoost, extreme gradient boosting (XGB) and random forest (RF). …”
Conference Paper -
11
Development of an Activity Recognition System Using Accelerometers
Published 2014“…With accelerometers that capture the acceleration rate of different activities and Decision Tree algorithm for classification, the system is able to predict accurately the activity performed by the wearer. …”
Get full text
Get full text
Final Year Project -
12
Automatic extraction of digital terrain model and Building Footprint from airborne LiDAR data using rule-based learning techniques
Published 2021“…In the next step, after taking the filtering steps, the Buildings Footprint was created and was saved as a vector file in the output path by keeping the first reflectance, filtering the nearest neighbor, filtering based on intensity, creating a new network, applying the height filter, filtering based on a closed range, applying the size filter, creating the initial boundary, performing noise removal at the boundary, correcting boundary fluctuations, and finally using the decision tree. Finally, the Buildings Footprint developed based on the algorithm was compared with the Buildings Footprint developed manually to assess the accuracy of the results. …”
Get full text
Get full text
Get full text
Thesis -
13
A stacked ensemble deep learning model for water quality prediction / Wong Wen Yee
Published 2023“…The proposed deep learning model renders faster without the use of SMOTE. Any resampling algorithm is not a necessity in the case of this proposed algorithm. …”
Get full text
Get full text
Get full text
Thesis -
14
Challenges of hidden data in the unused area two within executable files
Published 2009“…Results: The programs were coded in Java computer language and implemented on Pentium PC. …”
Get full text
Get full text
Get full text
Article -
15
Empirical study on intelligent android malware detection based on supervised machine learning
Published 2020“…More significantly, this paper empirically discusses and compares the performances of six supervised machine learning algorithms, known as K-Nearest Neighbors (K-NN), Decision Tree (DT), Support Vector Machine (SVM), Random Forest (RF), Naïve Bayes (NB), and Logistic Regression (LR), which are commonly used in the literature for detecting malware apps.…”
Get full text
Get full text
Get full text
Get full text
Article -
16
A deep learning approach: The impact of sentiment analysis of Bangladeshi workers over the world
Published 2025“…TF-IDF vectorization was used for feature extraction, followed by basic machine learning algorithms such as Decision Tree, Support Vector Machine, and Naive Bayes. …”
Get full text
Get full text
Get full text
Article -
17
Water Quality Index Using Modified Random Forest Technique: Assessing Novel Input Features
Published 2024journal::journal article -
18
Text-based emotion prediction system using machine learning approach
Published 2020“…Therefore, four supervised machine learning classification algorithms such as Multinomial Naïve Bayes, Support Vector Machine, Decision Trees, and kNearest Neighbors were investigated. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
19
Predictive modeling and feature attribution of CO₂ adsorption on LDH-derived materials using machine learning approach
Published 2025“…We report the application of six machine learning models, namely Random Forest (RF), gradient boosting decision tree (GBDT), extreme gradient boosting (XGBoost), Light gradient boosting machine (LightGBM), categorical boosting (CatBoost), and Adaptive boosting (AdaBoost) to predict CO2 adsorption capacity on LDH-derived materials. …”
Get full text
Get full text
Get full text
Article -
20
Fuzzy-based multi-agent approach for reliability assessment and improvement of power system protection
Published 2015“…Meanwhile, the second MAS model has been designed using two agents as follows: the first agent is a fault current agent that is to determine the fault current at all points before and after grounding; the second agent is the time operating of the agent which is used to determine the relay operating time before and after modifying fault current. The simulation results for the first and second models are done using the data obtained from Malaysia distribution network (DISCO-Net) and 69 bus test system that were implemented using Java Agent Development Framework package software. …”
Get full text
Get full text
Thesis
