Search Results - (( web classification tree algorithm ) OR ( java application optimization algorithm ))
Search alternatives:
- application optimization »
- classification tree »
- web classification »
- java application »
- tree algorithm »
-
1
A Data Mining Approach to Construct Graduates Employability Model in Malaysia
Published 2024Get full text
Article -
2
An Automated System For Classifying Conference Papers
Published 2021“…This project is aimed to develop an automated web-based conference paper system for the manual process of assigning papers to reviewers by using classification models. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
3
A data mining approach to construct graduates employability model in Malaysia
Published 2011“…The performance of Bayes algorithms are also compared against a number of tree-based algorithms. …”
Get full text
Get full text
Get full text
Article -
4
Comparative study of machine learning algorithms in data classification
Published 2025“…This research conducts a comparative study of various machine learning algorithms for dataset classification to identify the most accurate and reliable classifier. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
5
Comparison on machine learning algorithm to fast detection of malicious web pages
Published 2021“…Selected dataset from well-known resources will be used based on identified features in order to verify the web pages form legitimates ones. Compared to several decision tree method, Random Forest has shown promising and higher sensitivity result towards malicious data which is 98.3% compared to other classification algorithm…”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
6
A Proposed False Report Identification Algorithm for a Mobile Application in the IoT Environment
Published 2024Proceedings Paper -
7
Optimization of blood vessel detection in retina images using multithreading and native code for portable devices
Published 2013Get full text
Get full text
Conference or Workshop Item -
8
Performance evaluation of real-time multiprocessor scheduling algorithms
Published 2016“…These results suggests that optimal algorithms may turn to be non-optimal when practically implemented, unlike USG which reveals far less scheduling overhead and hence could be practically implemented in real-world applications. …”
Get full text
Get full text
Conference or Workshop Item -
9
Cyberbullying detection: a machine learning approach
Published 2022“…Machine learning is a hot topic and it is widely implemented in software, web application and more. Those algorithms are used in the classification or regression model to predict an input. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
10
Route Optimization System
Published 2005“…After much research into the many algorithms available, and considering some, including Genetic Algorithm (GA), the author selected Dijkstra's Algorithm (DA). …”
Get full text
Get full text
Final Year Project -
11
-
12
Attribute reduction based scheduling algorithm with enhanced hybrid genetic algorithm and particle swarm optimization for optimal device selection
Published 2022“…Enhance hybrid genetic algorithm and particle Swarm optimization are developed to select the optimal device in either fog or cloud. …”
Get full text
Get full text
Article -
13
Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction
Published 2022“…The results show that using dimensionality reduction techniques along with the ML algorithms with a dataset containing high-dimensional data significantly improves the classification results. …”
Get full text
Get full text
Get full text
Article -
14
Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction
Published 2022“…The results show that using dimensionality reduction techniques along with the ML algorithms with a dataset containing high-dimensional data significantly improves the classification results. …”
Get full text
Get full text
Get full text
Article -
15
Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction
Published 2022“…The results show that using dimensionality reduction techniques along with the ML algorithms with a dataset containing high-dimensional data significantly improves the classification results. …”
Get full text
Get full text
Get full text
Article -
16
Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction
Published 2022“…The results show that using dimensionality reduction techniques along with the ML algorithms with a dataset containing high-dimensional data significantly improves the classification results. …”
Get full text
Get full text
Get full text
Article -
17
Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction
Published 2023“…The results show that using dimensionality reduction techniques along with the ML algorithms with a dataset containing high-dimensional data significantly improves the classification results. …”
Get full text
Get full text
Get full text
Article -
18
Twofold Integer Programming Model for Improving Rough Set Classification Accuracy in Data Mining.
Published 2005“…The accuracy for rules and classification resulted from the TIP method are compared with other methods such as Standard Integer Programming (SIP) and Decision Related Integer Programming (DRIP) from Rough Set, Genetic Algorithm (GA), Johnson reducer, HoltelR method, Multiple Regression (MR), Neural Network (NN), Induction of Decision Tree Algorithm (ID3) and Base Learning Algorithm (C4.5); all other classifiers that are mostly used in the classification tasks. …”
Get full text
Get full text
Thesis -
19
Ant colony optimization algorithm for load balancing in grid computing
Published 2012Get full text
Get full text
Get full text
Monograph -
20
Named entity recognition using a new fuzzy support vector machine.
Published 2008“…Some of the Machine learning algorithms used in NER methods are, support vector machine(SVM), Hidden Markov Model, Maximum Entropy Model (MEM) and Decision Tree. …”
Get full text
Get full text
Article
