Search Results - data distribution ((((from algorithm) OR (force algorithm))) OR (tree algorithm))
Search alternatives:
- data distribution »
- force algorithm »
- from algorithm »
- tree algorithm »
-
1
Algorithm Development of Bidirectional Agglomerative Hierarchical Clustering Using AVL Tree with Visualization
Published 2024thesis::doctoral thesis -
2
Not seeing the forest for the trees: Generalised linear model out-performs random forest in species distribution modelling for Southeast Asian felids
Published 2023“…Species Distribution Models (SDMs) are a powerful tool to derive habitat suitability predictions relating species occurrence data with habitat features. …”
Get full text
Get full text
Article -
3
HAPTIC VISUALIZATION USING VISUAL TEXTURE INFORMATION
Published 2011“…Wavelet decomposition is utilized to extract data information from texture data. In searching process, the data are retrieved based on data distribution. …”
Get full text
Get full text
Thesis -
4
Spectral signature analysis to determine mangrove species delineation structured by anthropogenic effects
Published 2021“…In this study, we used the spectral information divergence (SID) and spectral angle mapper (SAM) algorithm classification to identify ~ 40,000 individual trees from 19 mangrove species; these data were collected from 7 sampling points spread across 40,288 ha of the Matang Mangrove Forest Reserve (MMFR) in the state of Perak, Malaysia. …”
Get full text
Get full text
Article -
5
An Integrated Principal Component Analysis And Weighted Apriori-T Algorithm For Imbalanced Data Root Cause Analysis
Published 2016“…On the other hand, Apriori-T with indexing enumeration tree is used for low cost FPM. A semiconductor manufacturing case study with Work In Progress data and true alarm data is used to proof the proposed algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
6
Optimal network reconfiguration and intelligent service restoration prediction technique based on Cuckoo search spring algorithm / Mohamad Izwan Zainal
Published 2022“…Later, this MOCSSA is applied on service restoration to ensure the proposed algorithm technique is suitable in selecting the optimal switches for supply recovery after the line section is isolated from the system either by forced outage or planned outage purposes. …”
Get full text
Get full text
Thesis -
7
Parameter estimation and outlier detection for some types of circular model / Siti Zanariah binti Satari
Published 2015“…Here, we introduce a measure of similarity based on the circular distance and obtain a cluster tree using the single linkage clustering algorithm. …”
Get full text
Get full text
Thesis -
8
-
9
Improved tree routing protocol in zigbee networks
Published 2010“…ImpTR protocol uses an approach to select next hope depending on new algorithm and uses the same tree topology construction for distributing address to all sensor nodes in the network. …”
Get full text
Get full text
Thesis -
10
Delineating mangrove forest zone using spectral reflectance
Published 2020“…Species identification with spectral library derived from in-situ measurements using SID algorithm and derived from Landsat 8 using SAM algorithm was done. …”
Get full text
Get full text
Thesis -
11
A new classifier based on combination of genetic programming and support vector machine in solving imbalanced classification problem
Published 2016“…In the third experiment, SVGPM is evaluated on wilt disease data set from remote sensing study, to identify wilt diseased trees in high-resolution image. …”
Get full text
Get full text
Get full text
Thesis -
12
Small Dataset Learning In Prediction Model Using Box-Whisker Data Transformation
Published 2020“…Next, samples are generated from Normal Distribution. To test the effectiveness of the proposed algorithm, the real and generated samples is added to training phase to build a prediction model using M5 Model Tree. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
13
Enhancing clustering algorithm with initial centroids in tool wear region recognition
Published 2020“…It is embedded with a new tactic to recapture the K value and new initial seedings computation to kick off the system until it converges. Force components of cutting force Fc, thrust force Ft and perpendicular cutting force Fcn were extracted from Neo-MoMac cutting force measurement device. …”
Get full text
Get full text
Get full text
Get full text
Article -
14
White root disease auto-detection system for rubber trees based on dynamic electro-biochemical latex properties / Mohd Suhaimi Sulaiman
Published 2019“…In the beginning, 600 samples of latex from healthy rubber trees and white root disease infected rubber trees were taken from the RRIM station in Kota Tinggi, Johor. …”
Get full text
Get full text
Thesis -
15
-
16
Oil palm mapping over Peninsular Malaysia using Google Earth Engine and machine learning algorithms
Published 2020“…In this study, 30 m Landsat 8 data were processed using a cloud computing platform of Google Earth Engine (GEE) in order to classify oil palm land cover using non-parametric machine learning algorithms such as Support Vector Machine (SVM), Classification and Regression Tree (CART) and Random Forest (RF) for the first time over Peninsular Malaysia. …”
Get full text
Get full text
Get full text
Article -
17
Optimized scheme for efficient and scalable key management in IEEE 802.16e-based networks
Published 2015“…One of the trees is a binary tree data structure and the other is a B-tree data structure. …”
Get full text
Get full text
Thesis -
18
Development of a Web Access Control Technique Based User Access Behavior
Published 2004“…The development and the wide spread use of the World Wide Web allow for convenient electronic data storage and distribution all over the world. …”
Get full text
Get full text
Thesis -
19
-
20
A stylometry approach for blind linguistic steganalysis model against translation-based steganography
Published 2023“…However, accuracy of blind steganalysis algorithms highly depend on the features selected from the input data especially when attacking embedding techniques in TBS. …”
Get full text
Get full text
Get full text
Get full text
Thesis
