Search Results - (( pattern relation tree algorithm ) OR ( java application customization algorithm ))

Refine Results
  1. 1

    An Efficient Data Structure for General Tree-Like Framework in Mining Sequential Patterns Using MEMISP by Saputra, Dhany, Rambli, Dayang R.A., Foong, Oi Mean

    Published 2007
    “…Sequential pattern mining is a relatively new data-mining problem with many areas of applications. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2

    Pattern generation through feature values modification and decision tree ensemble construction by Akhand, M. A. H, Rahman, M.M. Hafizur, Murase, K.

    Published 2013
    “…The method modifies feature values of some patterns with the values of other patterns to generate different patterns for different classifiers. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    A hybrid interpretable deep structure based on adaptive neuro‑fuzzy inference system, decision tree, and K‑means for intrusion detection by Jia, Lu, Yin Chai, Wang, Chee Siong, Teh, Xinjin, Li, Liping, Zhao, Fengrui, Wei

    Published 2022
    “…For generating an interpretable deep architecture for identifying deep intrusion patterns, this study proposes an approach that combines ANFIS (Adaptive Network-based Fuzzy Inference System) and DT (Decision Tree) for interpreting the deep pattern of intrusion detection. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Application Of Multi-Layer Perceptron Technique To Detect And Locate The Base Of A Young Corn Plant by Morshidi, Malik Arman

    Published 2007
    “…In this research, a vision system algorithm has been developed to identify and locate base of young corn trees based upon robot vision technology, pattern recognition techniques, and knowledge-based decision theory. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Classification Analysis Of The Badminton Five Directional Lunges by Ho, Zhe Wei

    Published 2018
    “…Lunge type patterns were related to ID and GT. Conclusively, the identity, game reaction time and type of lunge were found being the key determinants for badminton lunge classification accounting for highest classification accuracy in REP Tree algorithm.…”
    Get full text
    Get full text
    Monograph
  6. 6

    Finger Motion In Classifying Offline Handwriting Patterns by Yeoh, Shen Horng

    Published 2017
    “…Therefore, this study aims to relate the finger movements to handwriting patterns. …”
    Get full text
    Get full text
    Monograph
  7. 7
  8. 8

    Mining Sequential Patterns Using I-PrefixSpan by Dhany , Saputra, Rambli Dayang, R.A., Foong, Oi Mean

    Published 2007
    “…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    An Improved Network Intrusion Detection Method Based On CNN-LSTM-SA by Bian, Hui

    Published 2025
    “…Traditional machine learning algorithms, such as Decision Trees, Naive Bayes, Random Forest, Random Trees, Multi-Layer Perceptron, and Support Vector Machines, have been extensively applied to address these threats. …”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    Thunderstorm Prediction Model Using SMOTE Sampling and Machine Learning Approach by Shirley, Rufus, Noor Azlinda, Ahmad, Zulkurnain, Abdul-Malek, Noradlina, Abdullah

    Published 2023
    “…Then the dataset is trained and tested with five Machine Learning (ML) algorithms, including Decision Trees (DT), Adaptive Boosting (AdaBoost), Random Forest (RF), Extra Trees (ET), and Gradient Boosting (GB). …”
    Get full text
    Get full text
    Get full text
    Proceeding
  11. 11

    Prediction of novel angiogenesis inhibitors using in silico method by Sulaiman, Abu Musa

    Published 2017
    “…Cancer and angiogenesis is closely related and inhibiting angiogenesis in cancer is heavily studied. …”
    Get full text
    Get full text
    Student Project
  12. 12

    An Integrated Principal Component Analysis And Weighted Apriori-T Algorithm For Imbalanced Data Root Cause Analysis by Ong, Phaik Ling

    Published 2016
    “…However, frequent pattern mining (FPM) using Apriori-like algorithms and support-confidence framework suffers from the myth of rare item problem in nature. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    Thunderstorm Prediction Model Using SMOTE Sampling and Machine Learning Approach by Rufus S.A., Ahmad N.A., Abdul-Malek Z., Abdullah N.

    Published 2024
    “…Then the dataset is trained and tested with five Machine Learning (ML) algorithms, including Decision Trees (DT), Adaptive Boosting (AdaBoost), Random Forest (RF), Extra Trees (ET), and Gradient Boosting (GB). …”
    Conference Paper
  14. 14

    Recovery of tree community composition across different types of anthropogenic disturbances and characterization of their effect using Landsat time series in Bornean tropical monta... by Keiko Ioki, Daniel James, Phua, Mui How, Satoshi Tsuyuki, Nobuo Imai

    Published 2022
    “…Five LTS metrics—time since the greatest disturbance (TSD), magnitude of disturbance (MD), distance to undisturbed forests (d_UND), recovery indicator (RI), and years to recovery (Y2R) were derived and were related to field-based tree community composition. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Advanced Processing of UPM-APSB’s AISA Airborne Hyperspectral Images for Individual Timber Species Identification and Mapping by Jusoff, Kamaruzaman

    Published 2007
    “…Kelat constituted the highest count of species (1,402) mapped followed by Kedondong (1,185 trees), Medang (1,116 trees) and others out of the total 13,861 trees. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
    Get full text
    Get full text
    Thesis
  17. 17

    A study of customer retention and churn rate management through data mining and customer profiling of Malaysian mobile user by Ong, Derek Lai Teik *, Tan, Madeline Su Lin *, Andrews, Elizabeth *

    Published 2012
    “…Apriori association algorithm was employed to determine product bundling and C&R decision trees were used for customer profiling. …”
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18

    Analytical framework for predicting online purchasing behavior in Malaysia using a machine learning approach by Mustakim, Nurul Ain

    Published 2025
    “…The descriptive analysis examines purchasing behavior through correlation and regression analyses, while the predictive model uses decision trees (J48, Random Tree, REPTree), rule-based algorithms (JRip, OneR, PART), and clustering (K-Means) to identify patterns and predict trends. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Twofold Integer Programming Model for Improving Rough Set Classification Accuracy in Data Mining. by Saeed, Walid

    Published 2005
    “…The accuracy for rules and classification resulted from the TIP method are compared with other methods such as Standard Integer Programming (SIP) and Decision Related Integer Programming (DRIP) from Rough Set, Genetic Algorithm (GA), Johnson reducer, HoltelR method, Multiple Regression (MR), Neural Network (NN), Induction of Decision Tree Algorithm (ID3) and Base Learning Algorithm (C4.5); all other classifiers that are mostly used in the classification tasks. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Design & Development of a Robotic System Using LEGO Mindstorm by Abd Manap, Nurulfajar, Md Salim, Sani Irwan, Haron, Nor Zaidi

    Published 2006
    “…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item