Search Results - (( program implementation developing algorithm ) OR ( using identification tree algorithm ))
Search alternatives:
- implementation developing »
- program implementation »
- using identification »
- identification tree »
- tree algorithm »
-
1
Arabic Speaker Identification System for Forensic Authentication Using K-NN Algorithm
Published 2023Conference Paper -
2
A Proposed False Report Identification Algorithm for a Mobile Application in the IoT Environment
Published 2024Proceedings Paper -
3
Improved random forest for feature selection in writer identification
Published 2015“…RF tree is a collection of tree predictors used to ensemble decision tree models with a randomized selection of features at each split. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
4
Investigating optimal smartphone placement for identifying stairs movement using machine learning
Published 2023“…It was observed that, by using the Decision Tree and Random Forest algorithm 100% accuracy was achieved, when the smartphone was placed at the thigh during stair movement. …”
Get full text
Get full text
Get full text
Get full text
Article -
5
Tree-based contrast subspace mining method
Published 2020“…The research works involve first preparing the real world numerical and categorical data sets. Then, the tree-based method, the genetic algorithm based parameter values identification of tree-based method, and followed by the genetic algorithm based tree-based method, for numerical data sets are developed and evaluated. …”
Get full text
Get full text
Get full text
Thesis -
6
Implementation of Autonomous Vehicle Navigation Algorithms Using Event-Driven Programming
Published 2012“…By using FSM to describe the behaviour of a navigating mobile robot, an equivalent algorithm can be developed. The algorithm can be relatively easy translated to a suitable program with event-driven programming technique. …”
Get full text
Get full text
Conference or Workshop Item -
7
The stopping rules for winsorized tree
Published 2017“…This mechanism is controlled by the proposed algorithm. In winsorized tree, data are screened for identifying outlier.If outlier is detected, the value is neutralized using winsorize approach. …”
Get full text
Get full text
Conference or Workshop Item -
8
Implementation of autonomous vehicle navigation algorithms using event-driven programming
Published 2012“…By using FSM to describe the behaviour of a navigating mobile robot, an equivalent algorithm can be developed. The algorithm can be relatively easy translated to a suitable program with event-driven programming technique. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
9
Detection and classification of conflict flows in SDN using machine learning algorithms
Published 2021“…Using a range flows from 1000 to 100000 with an increment of 10000 flows per step in two network topologies namely, Fat Tree and Simple Tree Topologies, that were created using the Mininet simulator and connected to the Ryu controller, the performance of the proposed algorithms was evaluated for efficiency and effectiveness across a variety of evaluation metrics. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
10
Detection of multiple mangoes using histogram of oriented gradient technique in aerial monitoring
Published 2016“…The project uses shape identification algorithm and Histogram of Oriented Gradient principle to detect and count the total number of mango on its tree using a quad copter with an attachable webcam. …”
Get full text
Get full text
Get full text
Article -
11
Ensemble-based machine learning algorithms for classifying breast tissue based on electrical impedance spectroscopy
Published 2020“…Therefore, we aimed to classify six classes of freshly excised tissues from a set of electrical impedance measurement variables using five ensemble-based machine learning (ML) algorithms, namely, the random forest (RF), extremely randomized trees (ERT), decision tree (DT), gradient boosting tree (GBT) and AdaBoost (Adaptive Boosting) (ADB) algorithms, which can be subcategorized as bagging and boosting methods. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
12
Data Classification and Its Application in Credit Card Approval
Published 2004“…This project is involved with identification of the available algorithms used in data classification and the implementation of C4.5 decision tree induction algorithm in solving the data classifying task. …”
Get full text
Get full text
Final Year Project -
13
Implementation of Color Filtering on FPGA
Published 2007“…The functionality of the algorithm is first verified in Matlab, simulating the expected output of the system before implementing it onto the FPGA development board. …”
Get full text
Get full text
Conference or Workshop Item -
14
Simulation of shortest path using a-star algorithm / Nurul Hani Nortaja
Published 2004“…As for WXES3l82, the thesis cover the development of programming code, the code implementation and testing and the evaluation including discussion about the problem/constraints meed in the coding program development. …”
Get full text
Get full text
Thesis -
15
Development of dynamic programming algorithm for maintenance scheduling problem
Published 2020“…Then, the data of the maintenance team from one of the utilities provider company in Malaysia was collected to be implemented in the development of a dynamic programming algorithm. …”
Get full text
Get full text
Thesis -
16
Object-based imagery analysis for automatic urban tree species detection using high resolution satellite image
Published 2016“…In this research, most of satisfactory results achieved from the generic model and proves it can be easily performed to different WorldView-2 images from different areas and provided the high accuracy through algorithms for tree species detection namely, Mesua Ferrea, Samanea Saman, and Casuarina Sumatrana without using any training data. …”
Get full text
Get full text
Thesis -
17
Development of DNA fragment assembly using idury-waterman algorithm / Nurul Azyanny Mustaffa
Published 2013“…It is to shows whether the program implemented satisfied the Idury-Waterman algorithm or not. …”
Get full text
Get full text
Student Project -
18
Modelling of the anti-collision algorithm in RFID system: article / Shafinaz Ismail
Published 2014“…To avoid these collisions, there are several anti-collision algorithms used in the RFID system. The major classifications of the algorithms are Aloha based protocols and tree based protocols. …”
Get full text
Get full text
Article -
19
Modelling of the anti-collision algorithm in RFID system / Shafinaz Ismail
Published 2014“…To avoid these collisions, there are several anti-collision algorithms used in the RFID system. The major classifications of the algorithms are Aloha based protocols and tree based protocols. …”
Get full text
Get full text
Thesis -
20
Development of a cost efficient vision system for defects detection / Muhammad Zarif Kamarudin
Published 2010“…In this project, MATLAB platform is used to program the entire algorithm furthermore implementing Graphical User Interface to communicate between the vision system and the user. …”
Get full text
Get full text
Monograph
