Search Results - (( using modification tree algorithm ) OR ( java application during algorithm ))
Search alternatives:
- using modification »
- application during »
- modification tree »
- java application »
- during algorithm »
- tree algorithm »
-
1
-
2
Amtree Protocol Enhancement by Multicast Tree Modification and Incorporation of Multiple Sources
Published 2008“…In mobile environment, when the source is mobile and migrates to a new location, the multicast tree needs to be rebuilt. AMTree is an active network based protocol intended to make the sending packets to the tree after source migration an efficient process without much modifications to the multicast tree. …”
Get full text
Get full text
Thesis -
3
Pattern generation through feature values modification and decision tree ensemble construction
Published 2013“…It is found that the performance of bagging and RSM algorithms can be improved by incorporating feature values modification with their training processes. …”
Get full text
Get full text
Get full text
Article -
4
Research on risk detection of autonomous vehicle based on rapidly-exploring random tree
Published 2023“…On the premise of ensuring safety and meeting the requirements of the vehicle’s kinematic constraints through the expansion of obstacles, the dynamic step size is used for random tree growth. A non-particle collision detection (NPCD) collision detection algorithm and path modification (PM) path modification strategy are proposed for the collision risk in the turning process, and geometric constraints are used to represent the possible security threats, so as to improve the efficiency and safety of vehicle global path driving and to provide reference for the research of driverless vehicles.…”
Get full text
Get full text
Get full text
Get full text
Article -
5
Classification of stock market index based on predictive fuzzy decision tree
Published 2005“…In this research, another modification of Fuzzy Decision Tree (FDT) classification techniques called predictive FDT is presented that aims to combine symbolic decision trees in data classification with approximate reasoning offered by fuzzy representation. …”
Get full text
Get full text
Thesis -
6
-
7
Edge assisted crime prediction and evaluation framework for machine learning algorithms
Published 2022“…To anticipate occurrences, ML methods such as Decision Trees, Neural Networks, K-Nearest Neighbors, and Impact Learning are being utilized, and their performance is compared based on the data processing and modification used. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
8
Classification with degree of importance of attributes for stock market data mining
Published 2004“…We present another modification of fuzzy decision tree (FDT) classification techniques that aims to combine symbolic decision trees in data classification with approximate reasoning offered by fuzzy representation. …”
Get full text
Get full text
Article -
9
Hybrid tabu search – strawberry algorithm for multidimensional knapsack problem
Published 2022“…Multidimensional Knapsack Problem (MKP) has been widely used to model real-life combinatorial problems. It is also used extensively in experiments to test the performances of metaheuristic algorithms and their hybrids. …”
Get full text
Get full text
Get full text
Thesis -
10
SUDOKU HELPER
Published 2015“…In this paper research, author presents an algorithm to provide a tutorial for any Sudoku player who got stuck during the solving process. …”
Get full text
Get full text
Final Year Project -
11
Bayesian random forests for high-dimensional classification and regression with complete and incomplete microarray data
Published 2018“…Random Forests (RF) are ensemble of trees methods widely used for data prediction, interpretation and variable selection purposes. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
12
-
13
Articulated robots motion planning using foraging ant strategy
Published 2008“…An alternative search approach using ant behaviour in a robotics application is applied. …”
Get full text
Get full text
Article -
14
Talkout : Protecting mental health application with a lightweight message encryption
Published 2022“…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
Get full text
Get full text
Get full text
Academic Exercise -
15
Development of a modified adaptive protection scheme using machine learning technique for fault classification in renewable energy penetrated transmission line
Published 2020“…The Random Tree standalone ML-AP relay model presented the best performing models from the ML-APS relay model with the best average performance for the correctly classified fault types of 97.61 % at 5 % significance level above other ML algorithms. …”
Get full text
Get full text
Thesis -
16
Tracking and recognizing the activity of multi resident in smart home environments
Published 2017“…Existing works mainly manipulate data association and algorithm modification on extra auxiliary of graphical nodes to model human tracking information in an environment to incorporate with the problems. …”
Get full text
Get full text
Get full text
Article -
17
-
18
-
19
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis -
20
An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications
Published 2015“…This research work was limited to Java based web applications. In future research, the method can be extended to include other programming languages as well as other similar web application security vulnerabilities.…”
Get full text
Get full text
Thesis
