Search Results - (( java implementation modified algorithm ) OR ( using interactive tree algorithm ))

Refine Results
  1. 1

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  2. 2

    OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT by Murad S.S., Badeel R., Alsandi N.S.A., Alshaaya R.F., Ahmed R.A., Muhammed A., Derahman M.

    Published 2023
    “…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
    Review
  3. 3

    Prime-based method for interactive mining of frequent patterns by Nadimi-Shahraki, Mohammad-Hossein

    Published 2010
    “…Since rerunning the mining algorithms from scratch can be very time consuming, researchers have introduced interactive mining to find proper patterns by using the current mining model with various minsup. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6

    Automatic generation of content security policy to mitigate cross site scripting by Mhana, Samer Attallah, Din, Jamilah, Atan, Rodziah

    Published 2016
    “…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7
  8. 8

    A study of graduate on time (GOT) for Ph.D students using decision tree model by Chin, Wan Yung, Ch’ng, Chee Keong, Mohd Jamil, Jastini

    Published 2019
    “…Therefore, this study aims to classify the Ph.D students into the group of “GOT achiever” and “non-GOT achiever” by using decision tree models. Historical data that related to all Ph.D students in a public university in Malaysia has been obtained directly from the database of Graduate Academic Information System (GAIS) in order to develop and compare the performance of decision tree models (Chi-square algorithm, Gini index algorithm, Entropy algorithm and an interactive decision tree). …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Combining object-based classification and data mining algorithm to classify urban surface materials from worldview-2 satellite image by Hamedianfar, Alireza, Mohd Shafri, Helmi Zulhaidi

    Published 2014
    “…This algorithm provides a decision tree output to represent the knowledge model, enabled a faster classification of intra-urban classes, and disabled the subjectivities which are related to the interaction of the analyst. …”
    Get full text
    Conference or Workshop Item
  10. 10

    Detection of eye movements based on EEG signals and the SAX algorithm by Shanmuga, P. M. M., Lau, Sian Lun *, Jou, Chichang.

    Published 2018
    “…We would like to investigate another technique, namely the Symbolic Aggregate Approximation (SAX) algorithm, to find out its suitability and performance against known classification algorithms such as Support Vector Machine (SVM), k-Nearest Neighbour (KNN) and Decision Tree (DT).…”
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    A novel ensemble decision tree-based CHi-squared Automatic Interaction Detection (CHAID) and multivariate logistic regression models in landslide susceptibility mapping by Althuwaynee, Omar F., Pradhan, Biswajeet, Park, Hyuck Jin, Lee, Jung Hyun

    Published 2014
    “…An ensemble algorithm of data mining decision tree (DT)-based CHi-squared Automatic Interaction Detection (CHAID) is widely used for prediction analysis in variety of applications. …”
    Get full text
    Get full text
    Article
  12. 12
  13. 13

    Enhance efficiency of answering XML keyword query using incompact structure of MCCTree by Sazaly, Ummu Sulaim

    Published 2012
    “…If the result cannot be used directly by the ranking method, the algorithm has an ineffective process. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Comparative study of machine learning algorithms in data classification by Tan, Kai Jun

    Published 2025
    “…The implementatn and comparative analysis will be conducted using Python, and Streamlit. Python scripts can now be transformed into interactive web apps through the integration of Streamlit, enabling dynamic viewing and real-time interaction with classification results. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  15. 15

    Landslide susceptibility mapping using decision-tree based chi-squared automatic interaction detection (CHAID) and logistic regression (LR) integration by Althuwaynee, Omar F., Pradhan, Biswajeet, Ahmad, Noordin

    Published 2014
    “…This article uses methodology based on chi-squared automatic interaction detection (CHAID), as a multivariate method that has an automatic classification capacity to analyse large numbers of landslide conditioning factors. …”
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16
  17. 17

    Modelling complex features from histone modification signatures using genetic algorithm for the prediction of enhancer region by Lee, Nung Kion, Fong, Pui Kwan, Mohd Tajuddin, Abdullah

    Published 2014
    “…Using Genetic Algorithm, this paper presents a modelling method to generate novel logical-based features from DNA sequences enriched with H3K4mel histone signatures. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Robotic path planning using rapidly-exploring random trees by Sherwani, Fahad

    Published 2013
    “…This study concerns the implementation of Rapidly-Exploring Random Trees (RRTs) algorithm for an autonomous robot path planning. …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20

    Determination of tree stem volume : A case study of Cinnamomum by Noraini Abdullah

    Published 2013
    “…Modelling of trees has attracted scientific research in various fields and disciplines since trees and forests play very important roles in the global system. …”
    Get full text
    Get full text
    Get full text
    Thesis