Search Results - (( java implementation tree algorithm ) OR ( missing rules using algorithm ))

Refine Results
  1. 1

    New Learning Models for Generating Classification Rules Based on Rough Set Approach by Al Shalabi, Luai Abdel Lateef

    Published 2000
    “…Missing values lead to the difficulty of extracting useful information from that data set. …”
    Get full text
    Get full text
    Thesis
  2. 2

    An Apriori-based Data Analysis on Suspicious Network Event Recognition by Jian, Z., Sakai, H., Watada, J., Roy, A., Hassan, M.H.B.

    Published 2019
    “…Then, each missing value in the test data set is decided by using the obtained rules. …”
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Enhanced mechanism to handle missing data of Hadith classifier by Aldhlan, Kawther A., Zeki, Ahmed M., Zeki, Akram M.

    Published 2011
    “…Decision tree algorithms have the ability to deal with missing values or wrong data. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  5. 5

    An enhanced robust association rules method for missing values imputation in Arabic language data set by Salem, Awsan Thabet

    Published 2023
    “…In this thesis, the Enhanced Robust Association Rules (ERAR) method for missing values imputation is proposed. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    NIS-Apriori-based rule generation with three-way decisions and its application system in SQL by Sakai, H., Nakata, M., Watada, J.

    Published 2020
    “…One of the topics that are considered is the possibility of estimating missing values via the obtained certain rules. The proposed methodology and the environment yielded by NIS-Apriori-based rule generation in SQL are useful for table data analysis with three-way decisions. …”
    Get full text
    Get full text
    Article
  8. 8

    Twofold Integer Programming Model for Improving Rough Set Classification Accuracy in Data Mining. by Saeed, Walid

    Published 2005
    “…The extraction of minimum rules operation is conducted after the default rules have been generated in order to obtain the most useful discovered rules. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Fuzzy modeling using Bat Algorithm optimization for classification by Noor Amidah, Ahmad Sultan

    Published 2018
    “…A Sazonov Engine which is a fuzzy java engine is use to apply Bat Algorithm in the experiment. The value of parameter is already set to use when applying every dataset in an experiment. …”
    Get full text
    Get full text
    Get full text
    Undergraduates Project Papers
  10. 10

    Deep-learning-based detection of missing road lane markings using YOLOv5 algorithm by Sophian, Ali, Azmi, Nur Hanisah, Bawono, Ali Aryo

    Published 2021
    “…This road lane markings mainly used to provide guidance and information for road user to comply with the rule of the road. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  11. 11

    Exploratory analysis with association rule mining algorithms in the retail industry / Alaa Amin Hashad ... [et al.] by Hashad, Alaa Amin, Khaw, Khai Wah, Alnoor, Alhamzah, Chew, Xin Ying

    Published 2024
    “…The FP-Growth algorithm was found to be faster and more effective than the Apriori algorithm in extracting frequent item sets and generating association rules. …”
    Get full text
    Get full text
    Article
  12. 12

    Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde by Ogunfolajin Maruff , Tunde

    Published 2022
    “…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    Breast cancer detection by using associative classifier with rule refinement method based on relevance feedback by Abubacker, Nirase Fathima, Azman, Azreen, Doraisamy, Shyamala, Azmi Murad, Masrah Azrifah

    Published 2022
    “…This paper aims to address this issue by refining rules that are static using dynamic rule refinement technique. …”
    Get full text
    Get full text
    Article
  14. 14

    Parameter estimation and outlier detection in linear functional relationship model / Adilah Abdul Ghapor by Adilah, Abdul Ghapor

    Published 2017
    “…As for the multiple outliers, a clustering algorithm is considered and a dendogram to visualise the clustering algorithm is used. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization by Mohammad Ata, Karimeh Ibrahim

    Published 2019
    “…This study proposes a car parking management system which applies Dijkstra’s algorithm, Ant Colony Optimization (ACO) and Binary Search Tree (BST) in structuring a guidance system for indoor parking. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Development of intelligent hybrid learning system using clustering and knowledge-based neural networks for economic forecasting : First phase by Che Mat @ Mohd Shukor, Zamzarina, Md Sap, Mohd Noor

    Published 2004
    “…We proposed KMeans clustering algorithm that is based on multidimensional scaling, joined with neural knowledge based technique algorithm for supporting the learning module to generate interesting clusters that will generate interesting rules for extracting knowledge from stock exchange databases efficiently and accurately.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17

    Minimizing Scheduling Overhead In LRE-TL Real-Time Multiprocessor Scheduling Algorithm by Alhussian, Hitham, Zakaria, Nordin, Hussin, Fawnizu Azmadi

    Published 2015
    “…LRE-TL achieves optimality by employing the fairness rule at the end of each time slice in a fluid schedule model. …”
    Get full text
    Get full text
    Article
  18. 18

    Privacy optimization and intrusion detection in modbus/tcp network-based scada in water distribution systems by Franco, Daniel Jose Da Graca Peceguina

    Published 2021
    “…Another problematic aspect is related to the intrusion detection solutions that are based on machine learning cluster algorithms to learn systems’ specifications and extract general state-based rules for attacks identification. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Minimizing scheduling overhead in LRE-TL real-time multiprocessor scheduling algorithm by Alhussian, H.S.A., Zakaria, M.N.B., Hussin, F.A.B.

    Published 2017
    “…LRE-TL achieves optimality by employing the fairness rule at the end of each time slice in a uid schedule model. …”
    Get full text
    Get full text
    Article
  20. 20

    Improving performance of automated coronary arterial tree center-line extraction, stent localization and tracking by Boroujeni, Farsad Zamani

    Published 2012
    “…The first contribution is automatic detection of seed points which serve as a prerequisite step for centerline extraction algorithm. The solution consists of an algorithm for automatic collection of candidate seed points using efficient grid line searching mechanism and a validation method which uses local geometric and intensity based features as effective validation rules to discriminate between the actual seed point and false alarms. …”
    Get full text
    Get full text
    Thesis