Search Results - (( java implementation phase algorithm ) OR ( program extraction tree algorithm ))
Search alternatives:
- implementation phase »
- java implementation »
- program extraction »
- phase algorithm »
- extraction tree »
- tree algorithm »
-
1
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…All the algorithm for the engine has been developed by using Java script language. …”
Get full text
Get full text
Thesis -
2
Predicting Student Performance in Object Oriented Programming Using Decision Tree : A Case at Kolej Poly-Tech Mara, Kuantan
Published 2013“…Using 10-fold cross validation for each algorithm, it was found that decision tree was the best algorithm with 83.6944% correctness. …”
Get full text
Get full text
Conference or Workshop Item -
3
Image classification using two dimensional wavelet coefficients with parallel computing
Published 2020“…This research algorithm demonstrated a very promising result with Support Vector Machines, this algorithm produces a 90% of accuracies whereas the decision tree algorithm gets 100% accuracies. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
4
Optimal route checking using genetic algorithm for UiTM's bus services / Tengku Salman Fathi Tengku Jaafar
Published 2006“…Although from human logical thinking, the route can be generated easily but the calculation of checking the route whether it is optimal route or not is difficult and will take long time to be implemented. This research study with the development of the Optimal Route Checking Using Genetic Algorithm system should solve this scenario. …”
Get full text
Get full text
Thesis -
5
Twofold Integer Programming Model for Improving Rough Set Classification Accuracy in Data Mining.
Published 2005“…The accuracy for rules and classification resulted from the TIP method are compared with other methods such as Standard Integer Programming (SIP) and Decision Related Integer Programming (DRIP) from Rough Set, Genetic Algorithm (GA), Johnson reducer, HoltelR method, Multiple Regression (MR), Neural Network (NN), Induction of Decision Tree Algorithm (ID3) and Base Learning Algorithm (C4.5); all other classifiers that are mostly used in the classification tasks. …”
Get full text
Get full text
Thesis -
6
-
7
A new mobile botnet classification based on permission and API calls
Published 2024Conference Paper -
8
Deep convolutional neural network processing of aerial stereo imagery to monitor vulnerable zones near power lines
Published 2018“…Accurate estimation of tree and vegetation heights near power poles can prevent the disruption of power transmission in vulnerable zones. …”
Get full text
Get full text
Article -
9
Deep convolutional neural network processing of aerial stereo imagery to monitor vulnerable zones near power lines
Published 2018“…Accurate estimation of tree and vegetation heights near power poles can prevent the disruption of power transmission in vulnerable zones. …”
Get full text
Get full text
Article -
10
-
11
A stylometry approach for blind linguistic steganalysis model against translation-based steganography
Published 2023“…While targeted steganalysis is designed to attack a specific embedding algorithm, blind steganalysis use features extracted or selection from the medium to detect any anomalies that indicate a possibility that a secret data has been embedded within the medium. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
12
Interactive blood vessel segmentation from retinal fundus image based on canny edge detector
Published 2021“…Segmentation of the vessel tree is an essential process of retinal analysis. …”
Get full text
Get full text
Get full text
Article
