Search Results - (( moderation classifications tree algorithm ) OR ( java implementation modified algorithm ))
Search alternatives:
- moderation classifications »
- implementation modified »
- classifications tree »
- java implementation »
- tree algorithm »
-
1
Effective k-Means Clustering in Greedy Prepruned Tree-based Classification for Obstructive Sleep Apnea
Published 2022“…Incorporation of prepruned decision trees to kmeans clustering through one to three types of tree-depth controllers and cluster partitioning was done to develop a combined algorithm named as Greedy Pre-pruned Treebased Clustering (GPrTC) algorithm. …”
Get full text
Get full text
Get full text
Article -
2
Performance analysis of machine learning algorithms for classification of infection severity levels on rubber leaves
Published 2023“…At the early infection stage, it is very difficult to diagnose the disease because infected trees do not exhibit any symptoms. Thus, this study was carried out to investigate the potential application of spectroscopic technology and machine learning algorithms to classify severity level of infected trees at early stage based on spectral data. …”
Get full text
Get full text
Get full text
Book Section -
3
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
4
Classification of basal stem rot disease in oil palm using dielectric spectroscopy
Published 2018“…Without implementing any data reduction algorithm, the highest classification accuracy was found in SVM classifier with 79.55%. …”
Get full text
Get full text
Thesis -
5
Mid-infrared spectroscopy for early detection of basal stem rot disease in oil palm
Published 2014“…The selected principal component scores were used in classification using linear discriminant analysis (LDA), quadratic discriminant analysis (QDA), k-nearest neighbor (kNN) and Naive-Bayes (NB) multivariate classification algorithms. …”
Get full text
Get full text
Article -
6
OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT
Published 2023“…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
Review -
7
Machine-learning approach using thermal and synthetic aperture radar data for classification of oil palm trees with basal stem rot disease
Published 2021“…To identify non-infected and BSR-infected trees, the WEKA tool version 3.8.5 was used for classification. …”
Get full text
Get full text
Thesis -
8
-
9
An intra-severity classification and adaptation technique to improve dysarthric speech recognition accuracy / Bassam Ali Qasem Al-Qatab
Published 2020“…The algorithms include Linear Discriminant Analysis (LDA), Artificial Neural Network (ANN), Support Vector Machine (SVM), Naive Bayes (NB), Classification And Regression Tree (CART), Random Forest (RF). …”
Get full text
Get full text
Get full text
Thesis -
10
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
Get full text
Get full text
Thesis -
11
Automatic generation of content security policy to mitigate cross site scripting
Published 2016“…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
Get full text
Get full text
Conference or Workshop Item -
12
Recommendation System Model For Decision Making in the E-Commerce Application
Published 2024thesis::doctoral thesis -
13
FT-IR absorbance data for early detection of oil palm fungal disease infestation
Published 2012“…At present study, we propose to apply a mid-infrared spectroscopy technique for detection of infected oil palm trees at three stages of infection. Leaf samples of healthy, mild, moderate and sever-infected trees were measured using Fourier transform infrared (FTIR) spectrometers system to obtain absorbance data from the range of 2.55-25.05 μm. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
14
Spectral features selection and classification of oil palm leaves infected by Basal stem rot (BSR) disease using dielectric spectroscopy
Published 2018“…Thus, this paper investigated the feasibility of utilizing electrical properties such as impedance, capacitance, dielectric constant, and dissipation factor in early detection of BSR disease in oil palm tree. Leaf samples from different oil palm trees (healthy, mild, moderate, and severely-infected) were collected and measured using a solid test fixture (16451B, Keysight Technologies, Japan) connected to an impedance analyzer (4294A, Agilent Technologies, Japan) at a frequency range of 100 kHz–30 MHz with 300 spectral interval. …”
Get full text
Get full text
Article -
15
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis -
16
An improved hybrid learning approach for better anomaly detection
Published 2011“…Therefore, anomaly detection is often associated with high false alarm with only moderate accuracy of detection rates. In recent years, data mining approach for intrusion detection have been proposed and used such as neural networks, clustering, genetic algorithms, decision trees, and support vector machines. …”
Get full text
Get full text
Thesis -
17
Assessment of near-infrared and mid-infrared spectroscopy for early detection of basal stem rot disease in oil palm plantation
Published 2013“…Results confirmed the usefulness and efficiency of spectra-based classification approach for fast screening of BSR.…”
Get full text
Get full text
Thesis -
18
Challenges of hidden data in the unused area two within executable files
Published 2009“…Results: The programs were coded in Java computer language and implemented on Pentium PC. …”
Get full text
Get full text
Get full text
Article -
19
-
20
Fuzzy-based multi-agent approach for reliability assessment and improvement of power system protection
Published 2015“…Meanwhile, the second MAS model has been designed using two agents as follows: the first agent is a fault current agent that is to determine the fault current at all points before and after grounding; the second agent is the time operating of the agent which is used to determine the relay operating time before and after modifying fault current. The simulation results for the first and second models are done using the data obtained from Malaysia distribution network (DISCO-Net) and 69 bus test system that were implemented using Java Agent Development Framework package software. …”
Get full text
Get full text
Thesis
