Search Results - (( using modification tree algorithm ) OR ( java data normalization algorithm ))

  • Showing 1 - 20 results of 20
Refine Results
  1. 1
  2. 2

    Amtree Protocol Enhancement by Multicast Tree Modification and Incorporation of Multiple Sources by Al‐Sharafi, Ali Mohammed Ali

    Published 2008
    “…In mobile environment, when the source is mobile and migrates to a new location, the multicast tree needs to be rebuilt. AMTree is an active network based protocol intended to make the sending packets to the tree after source migration an efficient process without much modifications to the multicast tree. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly by Zulkifly, Ahmad Zuladzlan

    Published 2019
    “…Even a normal people using clustering to grouping their data. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Pattern generation through feature values modification and decision tree ensemble construction by Akhand, M. A. H, Rahman, M.M. Hafizur, Murase, K.

    Published 2013
    “…It is found that the performance of bagging and RSM algorithms can be improved by incorporating feature values modification with their training processes. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    SANAsms: Secure short messaging system for secure GSM mobile communication by Anuar, N.B., Azlan, I.M., Wahid, A.W.A., Zakaria, O.

    Published 2008
    “…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    Research on risk detection of autonomous vehicle based on rapidly-exploring random tree by Yincong Ma, Lim, Kit Guan, Tan, Min Keng, Sin, Helen Ee Chuo, Ali Farzamnia, Tze, Kenneth Kin Teo

    Published 2023
    “…On the premise of ensuring safety and meeting the requirements of the vehicle’s kinematic constraints through the expansion of obstacles, the dynamic step size is used for random tree growth. A non-particle collision detection (NPCD) collision detection algorithm and path modification (PM) path modification strategy are proposed for the collision risk in the turning process, and geometric constraints are used to represent the possible security threats, so as to improve the efficiency and safety of vehicle global path driving and to provide reference for the research of driverless vehicles.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Classification of stock market index based on predictive fuzzy decision tree by Khokhar, Arashid Hafeez

    Published 2005
    “…In this research, another modification of Fuzzy Decision Tree (FDT) classification techniques called predictive FDT is presented that aims to combine symbolic decision trees in data classification with approximate reasoning offered by fuzzy representation. …”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Electing the best set of features will help to improve the classifier predictions in terms of the normal and abnormal pattern. The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Edge assisted crime prediction and evaluation framework for machine learning algorithms by Adhikary, Apurba, Murad, Saydul Akbar, Munir, Md Shirajum, Choong Seon, Hong Seong

    Published 2022
    “…To anticipate occurrences, ML methods such as Decision Trees, Neural Networks, K-Nearest Neighbors, and Impact Learning are being utilized, and their performance is compared based on the data processing and modification used. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    Classification with degree of importance of attributes for stock market data mining by Khokhar, Rashid Hafeez, Md. Sap, Mohd. Noor

    Published 2004
    “…We present another modification of fuzzy decision tree (FDT) classification techniques that aims to combine symbolic decision trees in data classification with approximate reasoning offered by fuzzy representation. …”
    Get full text
    Get full text
    Article
  12. 12

    Hybrid tabu search – strawberry algorithm for multidimensional knapsack problem by Wong, Jerng Foong

    Published 2022
    “…Multidimensional Knapsack Problem (MKP) has been widely used to model real-life combinatorial problems. It is also used extensively in experiments to test the performances of metaheuristic algorithms and their hybrids. …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    Bayesian random forests for high-dimensional classification and regression with complete and incomplete microarray data by Oyebayo, Olaniran Ridwan

    Published 2018
    “…Random Forests (RF) are ensemble of trees methods widely used for data prediction, interpretation and variable selection purposes. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15

    Articulated robots motion planning using foraging ant strategy by Mohamad, Mohd. Murtadha

    Published 2008
    “…An alternative search approach using ant behaviour in a robotics application is applied. …”
    Get full text
    Get full text
    Article
  16. 16

    Challenges of hidden data in the unused area two within executable files by Naji, Ahmed Wathik, Zaidan, A.A., Zaidan, B.B.

    Published 2009
    “…The designed algorithms were intended to help in proposed system aim to hide and retract information (data file) with in unused area 2 of any execution file(exe.file). …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Development of a modified adaptive protection scheme using machine learning technique for fault classification in renewable energy penetrated transmission line by Olufemi, Osaji Emmanuel

    Published 2020
    “…The Random Tree standalone ML-AP relay model presented the best performing models from the ML-APS relay model with the best average performance for the correctly classified fault types of 97.61 % at 5 % significance level above other ML algorithms. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Tracking and recognizing the activity of multi resident in smart home environments by Mohamed, Raihani, Perumal, Thinagaran, Sulaiman, Md. Nasir, Mustapha, Norwati, Abd Manaf, Syaifulnizam

    Published 2017
    “…Existing works mainly manipulate data association and algorithm modification on extra auxiliary of graphical nodes to model human tracking information in an environment to incorporate with the problems. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Anfis Modelling On Diabetic Ketoacidosis For Unrestricted Food Intake Conditions by Saraswati, Galuh Wilujeng

    Published 2017
    “…Two sets of experimental data involving 20 diabetic patients and 20 healthy subjects were collected from CITO laboratory Semarang Central Java, Indonesia. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    Predicting factors of library traffic for UiTMCTKKT Cendekiawan Library using predictive analytics / Azzatul Husna Abdul Aziz by Abdul Aziz, Azzatul Husna

    Published 2025
    “…The CRISP-DM methodology was followed to apply machine learning algorithms, namely Random Forest, Decision Tree, and Naive Bayes, to the data gathered in the library which is traffic, book rentals, and questionnaires. …”
    Get full text
    Get full text
    Thesis