Search Results - (( data identification tree algorithm ) OR ( java application using algorithm ))
Search alternatives:
- data identification »
- identification tree »
- java application »
- using algorithm »
- tree algorithm »
-
1
Arabic Speaker Identification System for Forensic Authentication Using K-NN Algorithm
Published 2023“…Classification (of information); Data mining; Digital forensics; Forestry; Learning algorithms; Loudspeakers; Motion compensation; Nearest neighbor search; Speech recognition; Trees (mathematics); K-near neighbor; Logistic model tree; Logistics model; Mel frequency cepstral co-efficient; Mel frequency cepstral coefficient; Mel-frequency cepstral coefficients; Mining classification; Model trees; Nearest-neighbour; Speaker identification systems; Authentication…”
Conference Paper -
2
Tree-based contrast subspace mining method
Published 2020“…The research works involve first preparing the real world numerical and categorical data sets. Then, the tree-based method, the genetic algorithm based parameter values identification of tree-based method, and followed by the genetic algorithm based tree-based method, for numerical data sets are developed and evaluated. …”
Get full text
Get full text
Get full text
Thesis -
3
Investigating optimal smartphone placement for identifying stairs movement using machine learning
Published 2023“…The data was trained against 6 machine learning algorithms namely Decision Tree, Logistic Regression, Naive Bayes, Random Forest, Neural Networks and KNN. …”
Get full text
Get full text
Get full text
Get full text
Article -
4
Data Classification and Its Application in Credit Card Approval
Published 2004“…This project is involved with identification of the available algorithms used in data classification and the implementation of C4.5 decision tree induction algorithm in solving the data classifying task. …”
Get full text
Get full text
Final Year Project -
5
The stopping rules for winsorized tree
Published 2017“…This mechanism is controlled by the proposed algorithm. In winsorized tree, data are screened for identifying outlier.If outlier is detected, the value is neutralized using winsorize approach. …”
Get full text
Get full text
Conference or Workshop Item -
6
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
7
-
8
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
9
-
10
Object-based imagery analysis for automatic urban tree species detection using high resolution satellite image
Published 2016“…In this research, most of satisfactory results achieved from the generic model and proves it can be easily performed to different WorldView-2 images from different areas and provided the high accuracy through algorithms for tree species detection namely, Mesua Ferrea, Samanea Saman, and Casuarina Sumatrana without using any training data. …”
Get full text
Get full text
Thesis -
11
Tree species and aboveground biomass estimation using machine learning, hyperspectral and LiDAR data / Nik Ahmad Faris Nik Effendi
Published 2022“…In this research, Object-Based Image Analysis (OBIA) method was applied on hyperspectral data to extract the crown of individual tree species for classification and estimation purposes. …”
Get full text
Get full text
Thesis -
12
Identification Of Flow Blockage Levels In Centrifugal Pump By Machine Learning
Published 2021Get full text
Get full text
Monograph -
13
Keylogger detection analysis using machine learning algorithm / Muhammad Faiz Hazim Abdul Rahman
Published 2022“…There are a few outcomes that have been achieved to decide between those two machine learning methods that have better accuracy to carry out analysis on the dataset which of the two, but rather Decision Tree, have the greater accuracy. Early identification of a keylogger malware attack could prevent hackers from accessing personal user data and reduce the likelihood of infiltration, which could reveal account information, credit cards, usernames, passwords, and other data. …”
Get full text
Get full text
Student Project -
14
Data mining approach to herbs classification
Published 2018Get full text
Get full text
Get full text
Article -
15
Correlation analysis and predictive performance based on KNN and decision tree with augmented reality for nuclear primary cooling process / Ahmad Azhari Mohamad Nor
Published 2024“…Subsequently, predictive models employing k-nearest neighbour and decision tree algorithms are constructed and evaluated based on accuracy, precision, and recall metrics. …”
Get full text
Get full text
Thesis -
16
Determination of tree stem volume : A case study of Cinnamomum
Published 2013“…Illustrations and algorithms are incorporated into the procedures. Non-normal and nonlinear data variables are addressed, hence data characterization is presented. …”
Get full text
Get full text
Get full text
Thesis -
17
Data mining for structural damage identification using hybrid artificial neural network based algorithm for beam and slab girder / Meisam Gordan
Published 2020“…In the modeling phase, amongst all DM algorithms, the applicability of machine learning, artificial intelligence and statistical data mining techniques were examined using Support Vector Machine (SVM), Artificial Neural Network (ANN) and Classification and Regression Tree (CART) to detect the hidden patterns in vibration data. …”
Get full text
Get full text
Get full text
Thesis -
18
Crown counting and mapping of missing oil palm tree using airborne imaging system
Published 2019“…A graphical user interface by using MATLAB language was created based on the best executed method to aid users in counting the trees automatically. This helps to facilitate semi-skillful users to implement the tree counting algorithms. …”
Get full text
Get full text
Thesis -
19
Real-Time Video Processing Using Native Programming on Android Platform
Published 2012“…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
20
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis
