Search Results - data distribution ((((from algorithm) OR (force algorithm))) OR (tree algorithm))

Refine Results
  1. 1
  2. 2
  3. 3

    HAPTIC VISUALIZATION USING VISUAL TEXTURE INFORMATION by Adi, Waskito

    Published 2011
    “…Wavelet decomposition is utilized to extract data information from texture data. In searching process, the data are retrieved based on data distribution. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Spectral signature analysis to determine mangrove species delineation structured by anthropogenic effects by Abdul Wahab, Zulfa, Kamarudin, Norizah, Omar, Hamdan, Ibrahim, Faridah Anum, Parman, Rhyma Purnamasayangsukasih, Anwar, Fitrianto

    Published 2021
    “…In this study, we used the spectral information divergence (SID) and spectral angle mapper (SAM) algorithm classification to identify ~ 40,000 individual trees from 19 mangrove species; these data were collected from 7 sampling points spread across 40,288 ha of the Matang Mangrove Forest Reserve (MMFR) in the state of Perak, Malaysia. …”
    Get full text
    Get full text
    Article
  5. 5

    An Integrated Principal Component Analysis And Weighted Apriori-T Algorithm For Imbalanced Data Root Cause Analysis by Ong, Phaik Ling

    Published 2016
    “…On the other hand, Apriori-T with indexing enumeration tree is used for low cost FPM. A semiconductor manufacturing case study with Work In Progress data and true alarm data is used to proof the proposed algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Optimal network reconfiguration and intelligent service restoration prediction technique based on Cuckoo search spring algorithm / Mohamad Izwan Zainal by Zainal, Mohamad Izwan

    Published 2022
    “…Later, this MOCSSA is applied on service restoration to ensure the proposed algorithm technique is suitable in selecting the optimal switches for supply recovery after the line section is isolated from the system either by forced outage or planned outage purposes. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Parameter estimation and outlier detection for some types of circular model / Siti Zanariah binti Satari by Satari, Siti Zanariah

    Published 2015
    “…Here, we introduce a measure of similarity based on the circular distance and obtain a cluster tree using the single linkage clustering algorithm. …”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9

    Improved tree routing protocol in zigbee networks by Al-Harbawi, Mostafa Kamil Abdulhusain

    Published 2010
    “…ImpTR protocol uses an approach to select next hope depending on new algorithm and uses the same tree topology construction for distributing address to all sensor nodes in the network. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Delineating mangrove forest zone using spectral reflectance by Abdul Whab @ Abdul Wahab,, Zulfa

    Published 2020
    “…Species identification with spectral library derived from in-situ measurements using SID algorithm and derived from Landsat 8 using SAM algorithm was done. …”
    Get full text
    Get full text
    Thesis
  11. 11

    A new classifier based on combination of genetic programming and support vector machine in solving imbalanced classification problem by Mohd Pozi, Muhammad Syafiq

    Published 2016
    “…In the third experiment, SVGPM is evaluated on wilt disease data set from remote sensing study, to identify wilt diseased trees in high-resolution image. …”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    Small Dataset Learning In Prediction Model Using Box-Whisker Data Transformation by Lateh, Masitah bdul

    Published 2020
    “…Next, samples are generated from Normal Distribution. To test the effectiveness of the proposed algorithm, the real and generated samples is added to training phase to build a prediction model using M5 Model Tree. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    Enhancing clustering algorithm with initial centroids in tool wear region recognition by Kasim, Nur Adilla, Nuawi, Mohd Zaki, Abdul Ghani, Jaharah, Ngatiman, Nor Azazi, Che Haron, Che Hassan, Muhammad Rizal

    Published 2020
    “…It is embedded with a new tactic to recapture the K value and new initial seedings computation to kick off the system until it converges. Force components of cutting force Fc, thrust force Ft and perpendicular cutting force Fcn were extracted from Neo-MoMac cutting force measurement device. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    White root disease auto-detection system for rubber trees based on dynamic electro-biochemical latex properties / Mohd Suhaimi Sulaiman by Sulaiman, Mohd Suhaimi

    Published 2019
    “…In the beginning, 600 samples of latex from healthy rubber trees and white root disease infected rubber trees were taken from the RRIM station in Kota Tinggi, Johor. …”
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16

    Oil palm mapping over Peninsular Malaysia using Google Earth Engine and machine learning algorithms by Shaharum, Nur Shafira Nisa, Mohd Shafri, Helmi Zulhaidi, Wan Ab. Karim Ghani, Wan Azlina, Samsatli, Sheila, Al-Habshi, Mohammed Mustafa, Yusuf, Badronnisa

    Published 2020
    “…In this study, 30 m Landsat 8 data were processed using a cloud computing platform of Google Earth Engine (GEE) in order to classify oil palm land cover using non-parametric machine learning algorithms such as Support Vector Machine (SVM), Classification and Regression Tree (CART) and Random Forest (RF) for the first time over Peninsular Malaysia. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Optimized scheme for efficient and scalable key management in IEEE 802.16e-based networks by Sadeghi, Mohammad Mehdi Gilanian

    Published 2015
    “…One of the trees is a binary tree data structure and the other is a B-tree data structure. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Development of a Web Access Control Technique Based User Access Behavior by Abdelrahman, Selmaelsheikh

    Published 2004
    “…The development and the wide spread use of the World Wide Web allow for convenient electronic data storage and distribution all over the world. …”
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20

    A stylometry approach for blind linguistic steganalysis model against translation-based steganography by Mohd Lokman, Syiham

    Published 2023
    “…However, accuracy of blind steganalysis algorithms highly depend on the features selected from the input data especially when attacking embedding techniques in TBS. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis