Search Results - (( data deviation tree algorithm ) OR ( java application system algorithm ))
Search alternatives:
- java application »
- system algorithm »
- data deviation »
- deviation tree »
- tree algorithm »
-
1
The effect of different distance measures in detecting outliers using clustering-based algorithm for circular regression model
Published 2017“…Then, a stopping rule for the cluster tree based on the mean direction and circular standard deviation of the tree height is proposed. …”
Get full text
Get full text
Get full text
Article -
2
Comparative study of clustering-based outliers detection methods in circular-circular regression model
Published 2021“…A stopping rule for the cluster tree based on the mean direction and circular standard deviation of the tree height was used as the cutoff point and classifier to the cluster group that exceeded the stopping rule as potential outliers. …”
Get full text
Get full text
Get full text
Article -
3
Comparative study of clustering-based outliers detection methods in circularcircular regression model
Published 2021“…A stopping rule for the cluster tree based on the mean direction and circular standard deviation of the tree height was used as the cutoff point and classifier to the cluster group that exceeded the stopping rule as potential outliers. …”
Get full text
Get full text
Get full text
Article -
4
-
5
Comparative study of clustering-based outliers detection methods in circular-circular regression model
Published 2021“…A stopping rule for the cluster tree based on the mean direction and circular standard deviation of the tree height was used as the cutoff point and classifier to the cluster group that exceeded the stopping rule as potential outliers. …”
Get full text
Get full text
Get full text
Article -
6
Three-dimension coronary artery tree curvature confirmation
Published 2010“…We propose to use the standard deviation technique to compare the output features of the 3D coronary artery trees. …”
Get full text
Get full text
Get full text
Article -
7
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
8
-
9
Footwear quality evaluation using decision tree and logistic regression models
Published 2022“…The analysis showed that Decision Tree with Gini algorithm (three branches) in the first method prevails against the other methods with misclassification rate of 0.1307. …”
Get full text
Get full text
Thesis -
10
Real-time algorithmic music composition application.
Published 2022“…In addition, the system also utilises JavaFx and jFugue for its graphical user interface and music programming respectively. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
11
Route Optimization System
Published 2005“…After much research into the many algorithms available, and considering some, including Genetic Algorithm (GA), the author selected Dijkstra's Algorithm (DA). …”
Get full text
Get full text
Final Year Project -
12
-
13
Optimization of blood vessel detection in retina images using multithreading and native code for portable devices
Published 2013Get full text
Get full text
Conference or Workshop Item -
14
Analysis of short term load forecasting techniques / Tan Vy Luoh
Published 2019“…In this report, three common numerical STLF techniques including Multiple Linear Regression (MLR), Curve Fitting and Bagged Tree Regression are proposed to forecast one-day ahead load profile with a yearly historical load data. …”
Get full text
Get full text
Get full text
Thesis -
15
-
16
Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework
Published 2004“…Java Media Framework library and the RTP protocol for audio transmission were used as development tools.The developed system designed in this thesis together with experimental results proved that the system could be implemented successfully. …”
Get full text
Get full text
Thesis -
17
Parameter estimation and outlier detection for some types of circular model / Siti Zanariah binti Satari
Published 2015“…Then, a stopping rule for the cluster tree based on the mean direction and circular standard deviation of the tree height is proposed. …”
Get full text
Get full text
Thesis -
18
A hybrid interpretable deep structure based on adaptive neuro‑fuzzy inference system, decision tree, and K‑means for intrusion detection
Published 2022“…The proposed algorithm was trained, validated, and tested on the NSL-KDD (National security lab–knowledge discovery and data mining) dataset. …”
Get full text
Get full text
Get full text
Get full text
Article -
19
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
20
Network game (Literati) / Chung Mei Kuen
Published 2003“…The possible applications of multimedia-networked system are endless, as the demand to support interactive communication among groups of users has increased significantly. …”
Get full text
Get full text
Thesis
