Search Results - (( using composition clustering algorithm ) OR ( java application tree algorithm ))

  • Showing 1 - 18 results of 18
Refine Results
  1. 1
  2. 2

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Seed disperser ant algorithm for optimization / Chang Wen Liang by Chang , Wen Liang

    Published 2018
    “…The classical benchmark problems and composite benchmark functions from Congress on Evolutionary Computation (CEC) 2005 special session is used for validate SDAA. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5

    Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde by Ogunfolajin Maruff , Tunde

    Published 2022
    “…This thesis is based on the application of sentiment classification algorithm to tweet data with the goal of classifying messages based on the polarity of sentiment towards a particular topic (or subject matter). …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    Data redundancy reduction scheme for data aggregation in wireless sensor network by Adawy, Mohammad Ibrahim

    Published 2020
    “…This research proposes Data Redundancy Reduction Scheme (DRRS) which includes three algorithms namely, Metadata Classification (MC), Selection Active Nodes (SAN) and Anomaly Detection (AD) algorithms that works before data aggregation, when multiple composite events simultaneously occur in the different locations within the cluster. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    Mining Sequential Patterns Using I-PrefixSpan by Dhany , Saputra, Rambli Dayang, R.A., Foong, Oi Mean

    Published 2007
    “…In this paper, we propose an improvement of pattern growth-based PrefixSpan algorithm, called I-PrefixSpan. The general idea of I-PrefixSpan is to use the efficient data structure for general tree-like framework and separator database to reduce the execution time and memory usage. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    On the earthquake distribution modeling in Sumatra by Cauchy cluster process : comparing log-linear and log-additive intensity models by Susanto, Tabita Yuni, Choiruddin, Achmad, Purnomo, Jerry Dwi Trijoyo

    Published 2023
    “…The estimation procedure follows the standard two-step estimation technique, where the first step adapts the method for the Generalized Additive Models (GAMs) using penalized iteratively reweighted least squares (PIRLS) algorithm, and the second step employs the second-order composite likelihood. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    AI powered asthma prediction towards treatment formulation: an android app approach by Murad, Saydul Akbar, Adhikary, Apurba, Md Muzahid, Abu Jafar, Sarker, Md Murad Hossain, Khan, Md. Ashikur Rahman, Hossain, Md. Bipul, Bairagi, Anupam Kumar, Masud, Mehedi, Kowsher, Md

    Published 2022
    “…We utilized eight robust machine learning algorithms to analyze this dataset. We found that the Decision tree classifier had the best performance, out of the eight algorithms, with an accuracy of 87%. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11
  12. 12

    Hybrid of fuzzy clustering neural network over NSL dataset for intrusion detection system by Ahmad Zainaddin, Dahlia Asyiqin, Mohd Hanapi, Zurina

    Published 2013
    “…In recent years, data mining approach for intrusion detection have been advised and used. The approach such as Genetic Algorithms , Support Vector Machines, Neural Networks as well as clustering has resulted in high accuracy and good detection rates but with moderate false alarm on novel attacks. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    AI powered asthma prediction towards treatment formulation : An android app approach by Murad, Saydul Akbar, Adhikary, Apurba, Muzahid, Abu Jafar Md, Sarker, Md. Murad Hossain, Khan, Md. Ashikur Rahman, Hossain, Md. Bipul, Bairagi, Anupam Kumar, Masud, Mehedi, Kowsher, Md.

    Published 2022
    “…We utilized eight robust machine learning algorithms to analyze this dataset. We found that the Decision tree classifier had the best performance, out of the eight algorithms, with an accuracy of 87%. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Quantitative Analysis And Mapping Of Concrete Scanning Electron Microscope (SEM) Images by Maizul, Elly Nur Myaisara

    Published 2018
    “…By spatial segmentation of K-Means algorithms, the cluster groups generated were carefully reviewed before proceeding to the final analysis. …”
    Get full text
    Get full text
    Monograph
  15. 15
  16. 16

    Sustainable Location Identification Decision Protocol (SuLIDeP) For Determining The Location Of Recycling Centres In A Circular Economy by Mohamed Sultan, Al Amin, Mativenga, Paul Tarisai

    Published 2019
    “…More significantly, this process could be used for clustering and reducing supply chains complexity to enable the setting up of multiple and optimally located recycling centres. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Computational analysis of biological data: Where are we? by Soreq, Lilach, Mohamed, Wael Mohamed Yousef

    Published 2024
    “…Computer modeling allows such electrical stimulations using statistics, bioinformatics and advanced machine-learning algorithms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Book Chapter
  18. 18

    Dietary patterns and health outcomes among African American maintenance hemodialysis patients by Tallman, Dina A., Latifi, Eno, Kaur, Deepinder, Sulaheen, Ayesha, Ikizler, T. Alp, Chinna, Karuthan, Mat Daud, Zulfitri 'Azuan, Karupaiah, Tilakavati, Khosla, Pramod

    Published 2020
    “…Implausible energy intake reports were screened out by comparing reported energy intake (rEI) with predicted total energy expenditure (pTEE). Cluster analysis, using the k-means algorithm, identified two distinct dietary patterns in the study population: a high “sugar sweetened beverage” pattern (hiSSB) and a low “sugar sweetened beverage pattern” (loSSB). …”
    Get full text
    Get full text
    Get full text
    Article