Search Results - (( _ location model algorithm ) OR ( based application ((tree algorithm) OR (bees algorithm)) ))*

Refine Results
  1. 1

    A class skew-insensitive ACO-based decision tree algorithm for imbalanced data sets by Mohd Razali, Muhamad Hasbullah, Saian, Rizauddin, Yap, Bee Wah, Ku-Mahamud, Ku Ruhana

    Published 2021
    “…Ant-tree-miner (ATM) has an advantage over the conventional decision tree algorithm in terms of feature selection. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    A coalition model for efficient indexing in wireless sensor network with random mobility / Hazem Jihad Ali Badarneh by Hazem Jihad , Ali Badarneh

    Published 2021
    “…The proposed model consists of Dynamic-Coalition framework, Static-Coalition algorithm, and Coalition-Based Index-Tree framework. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    Improved tree routing protocol in zigbee networks by Al-Harbawi, Mostafa Kamil Abdulhusain

    Published 2010
    “…ZigBee is an industrial standard for wireless ad hoc networks based on IEEE 802.15.4. …”
    Get full text
    Get full text
    Thesis
  4. 4

    A new multicast-based architecture to support host mobility in IPv6 by M. Ali, Borhanuddin, Habaebi, Mohamed Hadi, AI-Talib, Sahar

    Published 2003
    “…As the mobile node moves to a new location, it joins the multicast group through the new location and prunes through the old location. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  5. 5
  6. 6

    A new multicast-based architecture to support host mobility in IPv6 by Mohd Ali, Borhanuddin, Habaebi, Mohamed Hadi, Al-Talib, Sahar Abdul Aziz

    Published 2003
    “…As the mobile node moves to a new location, it joins the multicast group through the new location and prunes through the old location. …”
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    Implementation of machine learning algorithms for streamflow prediction of Dokan dam by Sarmad Dashti Latif, Mr.

    Published 2023
    “…This study aims at comparing the application of deep learning algorithms and conventional machine learning algorithms for predicting reservoir inflow. …”
    text::Thesis
  8. 8

    A novel ensemble decision tree-based CHi-squared Automatic Interaction Detection (CHAID) and multivariate logistic regression models in landslide susceptibility mapping by Althuwaynee, Omar F., Pradhan, Biswajeet, Park, Hyuck Jin, Lee, Jung Hyun

    Published 2014
    “…An ensemble algorithm of data mining decision tree (DT)-based CHi-squared Automatic Interaction Detection (CHAID) is widely used for prediction analysis in variety of applications. …”
    Get full text
    Get full text
    Article
  9. 9

    Landslide susceptibility mapping using decision-tree based chi-squared automatic interaction detection (CHAID) and logistic regression (LR) integration by Althuwaynee, Omar F., Pradhan, Biswajeet, Ahmad, Noordin

    Published 2014
    “…An area under the curve (AUC) was used to test the model reliability and prediction capability with the training and validation landslide locations respectively. …”
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10
  11. 11

    Data mining for structural damage identification using hybrid artificial neural network based algorithm for beam and slab girder / Meisam Gordan by Meisam , Gordan

    Published 2020
    “…In the modeling phase, amongst all DM algorithms, the applicability of machine learning, artificial intelligence and statistical data mining techniques were examined using Support Vector Machine (SVM), Artificial Neural Network (ANN) and Classification and Regression Tree (CART) to detect the hidden patterns in vibration data. …”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    Fraud detection in shipping industry based on location using machine learning comparison techniques by Ganesan Subramaniam, Mr.

    Published 2023
    “…A number of popular existing algorithms were used to execute the model developed in Rapid tool such as Naïve Bayes , Neural Net , Deep Learning, Decision Tree, Logistic Regression, SVM and k-NN. …”
    text::Thesis
  13. 13

    Power line corridor vegetation encroachment detection from satellite images using retinanet and support vector machine by Fathi Mahdi Elsiddig Haroun, Mr.

    Published 2023
    “…The proposed vegetation encroachment detection framework used the state-of-art RetinaNet model to identify and locate the power transmission towers from satellite images. …”
    text::Thesis
  14. 14
  15. 15

    Named entity recognition using a new fuzzy support vector machine. by Mansouri, Alireza, Affendy, Lilly Suriani, Mamat, Ali

    Published 2008
    “…Some of the Machine learning algorithms used in NER methods are, support vector machine(SVM), Hidden Markov Model, Maximum Entropy Model (MEM) and Decision Tree. …”
    Get full text
    Get full text
    Article
  16. 16
  17. 17

    Using the bees algorithm to optimise a support vector machine for wood defect classification by Pham, D.T, Muhammad, Zaidi, Mahmuddin, Massudi, Ghanbarzadeh, Afshin, Koc, Ebubekir, Otri, Sameh

    Published 2007
    “…The algorithm, which is a swarm-based algorithm inspired by the food foraging behavior of honey bees, was also employed to select the components making up the feature vectors to be presented to the SVM. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18
  19. 19
  20. 20