Search Results - (( variable activation function algorithm ) OR ( based interactive tree algorithm ))

Refine Results
  1. 1

    Prime-based method for interactive mining of frequent patterns by Nadimi-Shahraki, Mohammad-Hossein

    Published 2010
    “…The PC-tree is a well-organized tree structure, which is systematically built based on descendant making introduced in this study. …”
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3

    Combining object-based classification and data mining algorithm to classify urban surface materials from worldview-2 satellite image by Hamedianfar, Alireza, Mohd Shafri, Helmi Zulhaidi

    Published 2014
    “…This algorithm provides a decision tree output to represent the knowledge model, enabled a faster classification of intra-urban classes, and disabled the subjectivities which are related to the interaction of the analyst. …”
    Get full text
    Conference or Workshop Item
  4. 4
  5. 5

    A novel ensemble decision tree-based CHi-squared Automatic Interaction Detection (CHAID) and multivariate logistic regression models in landslide susceptibility mapping by Althuwaynee, Omar F., Pradhan, Biswajeet, Park, Hyuck Jin, Lee, Jung Hyun

    Published 2014
    “…An ensemble algorithm of data mining decision tree (DT)-based CHi-squared Automatic Interaction Detection (CHAID) is widely used for prediction analysis in variety of applications. …”
    Get full text
    Get full text
    Article
  6. 6
  7. 7

    Enhance efficiency of answering XML keyword query using incompact structure of MCCTree by Sazaly, Ummu Sulaim

    Published 2012
    “…CGTreeGenerator compacted the XML tree by eliminating irrelevant nodes based on CLCA notion, which produced Compact Global Tree (CGTree). …”
    Get full text
    Get full text
    Thesis
  8. 8

    Landslide susceptibility mapping using decision-tree based chi-squared automatic interaction detection (CHAID) and logistic regression (LR) integration by Althuwaynee, Omar F., Pradhan, Biswajeet, Ahmad, Noordin

    Published 2014
    “…This article uses methodology based on chi-squared automatic interaction detection (CHAID), as a multivariate method that has an automatic classification capacity to analyse large numbers of landslide conditioning factors. …”
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    Determination of tree stem volume : A case study of Cinnamomum by Noraini Abdullah

    Published 2013
    “…Modelling of trees has attracted scientific research in various fields and disciplines since trees and forests play very important roles in the global system. …”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    Data-Driven Approach to Modeling Biohydrogen Production from Biodiesel Production Waste: Effect of Activation Functions on Model Configurations by Hossain, S.K.S., Ayodele, B.V., Alhulaybi, Z.A., Alwi, M.M.A.

    Published 2022
    “…The RBFNN model with softmax as the hidden layer activation function and identity as the outer layer activation function has the least predictive performance, as indicated by an R2 of 0.403 and a RMSE of 301.55. …”
    Get full text
    Get full text
    Article
  11. 11

    Shunt active power filter using hybrid fuzzy-proportional and crisp-integral control algorithms for total harmonic distortion improvement by Abdul Rahman, Nor Farahaida

    Published 2016
    “…Utilization of soft-computing algorithms in the operation of Shunt Active Power Filters (SAPFs) becomes a latest trend. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Modelling complex features from histone modification signatures using genetic algorithm for the prediction of enhancer region by Lee, Nung Kion, Fong, Pui Kwan, Mohd Tajuddin, Abdullah

    Published 2014
    “…Using Genetic Algorithm, this paper presents a modelling method to generate novel logical-based features from DNA sequences enriched with H3K4mel histone signatures. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Interactive blood vessel segmentation from retinal fundus image based on canny edge detector by Ibrahim, Haidi, Ooi, Alexander Ze Hwan, Soo, Siang Teoh, Embong, Zunaina, Abd Hamid, Aini Ismafairus, Zainon, Rafidah, Shir, Li Wang, Theam, Foo Ng, Hamzah, Rostam Affendi

    Published 2021
    “…After that, the edge detection techniques, which are based on the Canny algorithm, will be applied. The vessels will be selected interactively on the developed graphical user interface (GUI). …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Content-based recommender system for an academic social network / Vala Ali Rohani by Vala Ali, Rohani

    Published 2014
    “…The algorithm exploits all interests and preferences in a hierarchy tree structure. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Real time De-mixing system based on LMS adaptive algorithm for blind two source signals separation by Mehrkanoon, S., Moghavvemi, M., Fariborzi, H.

    Published 2007
    “…The time variant mixing matrix based on random vector with time variable elements are made. Several simulations obtain optimum results of implemented algorithm. …”
    Get full text
    Conference or Workshop Item
  16. 16
  17. 17

    Coronary artery segmentation in angiograms with pattern recognition techniques - a survey by Tayebi, Rohollah Moosavi, Sulaiman, Puteri Suhaiza, O. K. Rahmat, Rahmita Wirza, Dimon, Mohd Zamrin, Kadiman, Suhaini, Abdullah, Lilly Nurliyana, Mazaheri, Samaneh

    Published 2013
    “…Finally, we made a table to compare all the algorithms in each category against criteria such as: user interaction, angiography types, dimensionality, enhancement method, full coronary artery output, whole tree output, and 3D reconstruction ability.…”
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18

    A proposed algorithm of random vector in measuring similarity for network topology of Bursa Malaysia by Lim, San Yee

    Published 2018
    “…The behaviors and interactions among the stocks in Bursa Malaysia are then determined by using the Forest of all possible minimum spanning trees. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    MotionSure: a cloud-based algorithm for detection of injected object in data in motion by Islam, Thouhedul, Olanrewaju, Rashidah Funke, Khalifa, Othman Omran

    Published 2017
    “…Mostly, the Man In The Middle (MITM) attack happens in this stage by hijacking active session variables, manipulating files and objects. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  20. 20