Search Results - (( java implementation modified algorithm ) OR ( missing process tree algorithm ))
Search alternatives:
- implementation modified »
- java implementation »
- missing process »
- tree algorithm »
- process tree »
-
1
Crown counting and mapping of missing oil palm tree using airborne imaging system
Published 2019“…In Malaysia, there are plenty of large-scale oil palm plantations, but the counting of oil palm trees and missing trees processes are still manually done which is time consuming and costly. …”
Get full text
Get full text
Thesis -
2
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
3
-
4
-
5
Intelligent imputation method for mix data-type missing values to improve data quality
Published 2024“…A common challenge is the occurrence of missing data during the data input process. Numerous studies have proposed methods to impute missing values for data across multiple fields. …”
Get full text
Get full text
Get full text
Thesis -
6
Tangible interaction learning model to enhance learning activity processes among children with dyslexia
Published 2024“…A common challenge is the occurrence of missing data during the data input process. Numerous studies have proposed methods to impute missing values for data across multiple fields. …”
Get full text
Get full text
Get full text
Thesis -
7
OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT
Published 2023“…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
Review -
8
Improving performance of automated coronary arterial tree center-line extraction, stent localization and tracking
Published 2012“…Over the last decade, many algorithms have been developed to address this problem. …”
Get full text
Get full text
Thesis -
9
Design and performance analysis of a fast 4-way set associative cache controller using Tree Pseudo Least Recently Used algorithm
Published 2023“…Operational efficiency was evidenced by the controller's swift processing speeds: read hits were completed in a mere three cycles, read misses in five and a half cycles, and both write hits and misses in three and a half cycles. …”
Get full text
Get full text
Get full text
Get full text
Article -
10
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
Get full text
Get full text
Thesis -
11
Automatic generation of content security policy to mitigate cross site scripting
Published 2016“…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
Get full text
Get full text
Conference or Workshop Item -
12
An efficient indexing and retrieval of iris biometrics data using hybrid transform and firefly based K-means algorithm title
Published 2019“…It uses a weighted K-means clustering algorithm based on the improved FA to optimize the initial clustering centers of K-means algorithm, known as Weighted K-means clustering-Improved Firefly Algorithm (WKIFA). …”
Get full text
Get full text
Thesis -
13
-
14
Data Mining Analysis Of Chronic Kidney Disease (CKD) Level
Published 2022“…Data classifications are performed at a 10-fold-cross-validation mode using Naïve Bayes (NB), Support Vector Machine (SVM), and J48 Trees. The ZeroR algorithm was set as the baseline There are three levels of classification analyses: before and after handling the missing values, before and after the outliers’ treatment, and adding uncertain classes. …”
Get full text
Get full text
Monograph -
15
Robust partitioning and indexing for iris biometric database based on local features
Published 2018“…Further, the scalable K-means++ algorithm is used for partitioning and classification processes, and an efficient parallel technique that divides the features groups causing the formation of two b-trees based on index keys is applied for search and retrieval. …”
Get full text
Get full text
Get full text
Article -
16
Analysis of hyperspectral reflectance for disease classification of soybean frogeye leaf spot using Knime analytics
Published 2023“…This analysis involved the implementation of machine learning (ML) algorithms, including decision trees, random forests, and stacking, to classify soybean FLS severity levels. …”
Get full text
Get full text
Article -
17
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis -
18
Optimization and selection of maintenance policies in an electrical gas turbine generator based on the hybrid reliability-centered maintenance (RCM) model
Published 2020“…Hence, in the present study, a hybrid RCM model was proposed to fill these gaps and find the optimal maintenance policies and scheduling by a combination of hybrid linguistic-failure mode and effect analysis (HL-FMEA), the co-evolutionary multi-objective particle swarm optimization (CMPSO) algorithm, an analytic network process (ANP), and developed maintenance decision tree (DMDT). …”
Get full text
Get full text
Get full text
Article -
19
An improved diabetes risk prediction framework : An Indonesian case study
Published 2018“…Pre-processing resolves the issue of missing data and hence normalizes the data.Outlier treatment employs k-mean clustering to validate the class.Suitable components were selected through comparison of classifier algorithms and feature selection.Attribute weighting based feature selection was selected for assigning weightage.Weighted risk factor was used on training dataset in order to improve accuracy and computation time of the prediction. …”
Get full text
Get full text
Get full text
Thesis -
20
A stylometry approach for blind linguistic steganalysis model against translation-based steganography
Published 2023“…The performance of the stylometry-based blind steganalysis model is then evaluated based on all false rate, missing rate and accuracy rate and compared against three other standard classifiers in steganalysis; Naive Bayes (NB), k-Nearest Neighbor (k-NN), and Decision Tree (J48). …”
Get full text
Get full text
Get full text
Get full text
Thesis
