Search Results - (( java implementation tree algorithm ) OR ( knowledge utilization detection algorithm ))

Refine Results
  1. 1

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde by Ogunfolajin Maruff , Tunde

    Published 2022
    “…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization by Mohammad Ata, Karimeh Ibrahim

    Published 2019
    “…This study proposes a car parking management system which applies Dijkstra’s algorithm, Ant Colony Optimization (ACO) and Binary Search Tree (BST) in structuring a guidance system for indoor parking. …”
    Get full text
    Get full text
    Thesis
  4. 4

    An Innovative Signal Detection Algorithm in Facilitating the Cognitive Radio Functionality for Wireless Regional Area Network Using Singular Value Decomposition by Mohd. Hasbullah, Omar

    Published 2011
    “…The detection algorithm was developed analytically by applying the Signal Detection Theory (SDT) and the Random Matrix Theory (RMT). …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    Research on the construction of an efficient and lightweight online detection method for tiny surface defects through model compression and knowledge distillation by Chen, Qipeng, Xiong, Qiaoqiao, Huang, Haisong, Tang, Saihong, Liu, Zhenghong

    Published 2024
    “…In response to the current issues of poor real-time performance, high computational costs, and excessive memory usage of object detection algorithms based on deep convolutional neural networks in embedded devices, a method for improving deep convolutional neural networks based on model compression and knowledge distillation is proposed. …”
    Get full text
    Get full text
    Article
  6. 6
  7. 7

    Facial Drowsiness Signs Detection Algorithm Using Image Processing Techniques For Various Lighting Condition by Yuri, Nur Fatin Izzati

    Published 2017
    “…Viola-Jones algorithm is utilized for face detection. Upon acquiring the face location, the knowledge-based method is implemented to locate the eye and the mouth. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9

    A detailed description on unsupervised heterogeneous anomaly based intrusion detection framework by Udzir, Nur Izura, Hajamydeen, Asif Iqbal

    Published 2019
    “…Observing network traffic flow for anomalies is a common method in Intrusion Detection. More effort has been taken in utilizing the data mining and machine learning algorithms to construct anomaly based intrusion detection systems, but the dependency on the learned models that were built based on earlier network behaviour still exists, which restricts those methods in detecting new or unknown intrusions. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Electroencephalography Simulation Hardware for Realistic Seizure, Preseizure and Normal Mode Signal Generation by Mohamed, Shakir, Qidwai, Uvais, Malik, Aamir Saeed, Kamel , Nidal

    Published 2015
    “…With controlled data types, healthy/normal, seizure and pre-seizure classes, tuning of algorithms for detection and classification applications can be attained. …”
    Get full text
    Get full text
    Article
  11. 11

    Twisted pair cable fault diagnosis via random forest machine learning by Ghazali, N. B., Seman, F. C., Isa, K., Ramli, K. N., Z. Abidin, Z., Mustam, S. M., Haek, Haek, Z. Abidin, A. N., Asrokin, A.

    Published 2022
    “…Secondly, the feature transformation, a knowledge-based method, is utilized to pre-process the fault data. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Sentiment mining in twitter for early depression detection / Najihah Salsabila Ishak by Ishak, Najihah Salsabila

    Published 2021
    “…A comparison between built-in Scikit Learn Naive Bayes algorithm, and the scratch Naive Bayes algorithm is used to measure its effectiveness in terms of accuracy. …”
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14
  15. 15
  16. 16

    Real-time anomaly detection using clustering in big data technologies / Riyaz Ahamed Ariyaluran Habeeb by Riyaz Ahamed , Ariyaluran Habeeb

    Published 2019
    “…Subsequently, comparative analysis to further establish the problems has been carried out via utilization of various existing algorithms which were then validated using three openly available datasets. …”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    Robust overlapping community detection in complex networks with graph convolutional networks and fuzzy C-means by Mohammed Al-Andoli, Mohammed Nasser, Che Ku Mohd, Che Ku Nuraini, Harny, Irianto, Jamil Alsayaydeh, Jamil Abedalrahim, Alwayle, Ibrahim M., Ahmed Abuhoureyah, Fahd Saad

    Published 2024
    “…Existing methods often struggle to capture both network topology and node features, leading to suboptimal overlapping community detection. In this paper, we propose an efficient method called GCNFCM, which utilizes Graph Convolutional Networks (GCNs), Fuzzy C-means (FCM), and the modularity Q algorithm for overlapping community detection. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Cheating Detection in Examinations Using Improved YOLOv8 with Attention Mechanism by Yan, Zuo, Chai, Soo See, Goh, Kok Luong

    Published 2024
    “…To improve the efficiency of video reviews during invigilation, save labor costs, and strengthen invigilation efforts, this study proposes the use of target detection algorithms to achieve automatic detection of cheating actions in the exam room. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  19. 19
  20. 20