Search Results - data distribution ((tree algorithm) OR (based algorithm))
Search alternatives:
- data distribution »
- tree algorithm »
-
1
Optimized routing algorithm for mobile multicast source in Wireless Mesh Networks
Published 2015“…Simulation results show that the proposed algorithm converges and outperforms a source based tree algorithm. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
2
Algorithm Development of Bidirectional Agglomerative Hierarchical Clustering Using AVL Tree with Visualization
Published 2024thesis::doctoral thesis -
3
E2IDS: an enhanced intelligent intrusion detection system based on decision tree algorithm
Published 2022“…The model design is Decision Tree (DT) algorithm-based, with an approach to data balancing since the data set used is highly unbalanced and one more approach for feature selection. …”
Get full text
Get full text
Article -
4
Nano-scale VLSI clock routing module based on useful-skew tree algorithm
Published 2006“…We implemented Useful-Skew Tree (UST) algorithm which is based on the deferred-merge embedding (DME) paradigm, as the clock layout synthesis engine. …”
Get full text
Get full text
Article -
5
Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction
Published 2022“…Subsequently, DDoS attack detection is performed based on random forest (RF) and decision tree (DT) algorithms. …”
Get full text
Get full text
Get full text
Article -
6
Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction
Published 2022“…Subsequently, DDoS attack detection is performed based on random forest (RF) and decision tree (DT) algorithms. …”
Get full text
Get full text
Get full text
Article -
7
Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction
Published 2022“…Subsequently, DDoS attack detection is performed based on random forest (RF) and decision tree (DT) algorithms. …”
Get full text
Get full text
Get full text
Article -
8
Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction
Published 2022“…Subsequently, DDoS attack detection is performed based on random forest (RF) and decision tree (DT) algorithms. …”
Get full text
Get full text
Get full text
Article -
9
Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction
Published 2023“…Subsequently, DDoS attack detection is performed based on random forest (RF) and decision tree (DT) algorithms. …”
Get full text
Get full text
Get full text
Article -
10
Parameter estimation and outlier detection for some types of circular model / Siti Zanariah binti Satari
Published 2015“…Here, we introduce a measure of similarity based on the circular distance and obtain a cluster tree using the single linkage clustering algorithm. …”
Get full text
Get full text
Thesis -
11
-
12
A new classifier based on combination of genetic programming and support vector machine in solving imbalanced classification problem
Published 2016“…There are two methods in dealing with imbalanced classification problem, which are based on data or algorithmic level. Data level based methods are meant to solve the imbalanced classification problem based on the idea of making both classes equal in number. …”
Get full text
Get full text
Get full text
Thesis -
13
A cluster-based hybrid replica control protocol for high availability in data grid
Published 2019“…In Data Grid, data replication is a widely used technique for managing data, where exact copies of data or replicas are created and stored at many distributed sites. …”
Get full text
Get full text
Thesis -
14
An Integrated Principal Component Analysis And Weighted Apriori-T Algorithm For Imbalanced Data Root Cause Analysis
Published 2016“…On the other hand, Apriori-T with indexing enumeration tree is used for low cost FPM. A semiconductor manufacturing case study with Work In Progress data and true alarm data is used to proof the proposed algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
15
Improved tree routing protocol in zigbee networks
Published 2010“…ImpTR protocol uses an approach to select next hope depending on new algorithm and uses the same tree topology construction for distributing address to all sensor nodes in the network. …”
Get full text
Get full text
Thesis -
16
A proactive energy awareness traffic routing for wireless sensor networks against energy sink-holes
Published 2019“…This is adopted in the proposed balanced energy-hole prevention method in tree topology (EBEHA-T) with a single sink. Next, the problem of large variations in energy consumptions with multiple sinks in merging tree-based multiple energy hole alleviation algorithm (MEHA-MT) is addressed. …”
Get full text
Get full text
Thesis -
17
Delineating mangrove forest zone using spectral reflectance
Published 2020“…By using geospatial techniques and remotely sensed imagery data, the distribution of mangrove tree species associating with anthropogenic matrix can clearly be identified and mapped. …”
Get full text
Get full text
Thesis -
18
Optimized scheme for efficient and scalable key management in IEEE 802.16e-based networks
Published 2015“…One of the trees is a binary tree data structure and the other is a B-tree data structure. …”
Get full text
Get full text
Thesis -
19
An intelligent DDoS attack detection tree-based model using Gini index feature selection method
Published 2023“…This paper proposes a novel intelligent DDoS attack detection model based on a Decision Tee (DT) algorithm and an enhanced Gini index feature selection method. …”
Get full text
Get full text
Article -
20
White root disease auto-detection system for rubber trees based on dynamic electro-biochemical latex properties / Mohd Suhaimi Sulaiman
Published 2019“…Based on the statistical results, all of the measured data were normally distributed and can be discriminated since the significant value for normality test for all measured data were greater than 0.05 and paired sample t-test showed significant value less than 0.05. …”
Get full text
Get full text
Thesis
