Search Results - (( model validation tree algorithm ) OR ( speed communication devices algorithm ))

Refine Results
  1. 1

    Laptop price prediction using decision tree algorithm / Nurnazifah Abd Mokti by Abd Mokti, Nurnazifah

    Published 2024
    “…This research project focuses on developing a laptop price prediction model using the decision tree algorithm based on laptop specifications. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Hyper-Heuristic Evolutionary Approach for Constructing Decision Tree Classifiers by Kumar, Sunil, Ratnoo, Saroj, Vashishtha, Jyoti

    Published 2021
    “…Classification and Regression Tree (CART) algorithm is one of the renowned decision tree induction algorithms to address the classification as well as regression problems. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Trust based Lightweight Security Protocol for Device to Device Multihop Cellular Communication by Yasir, Javed

    Published 2020
    “…Device to Device (D2D) communication has gained a lot of popularity in recent years as it offers high speed, extended coverage, and ubiquitous connectivity. …”
    Get full text
    Get full text
    Thesis
  4. 4

    BMTutor research design: Malay sentence parse tree visualization by Muhamad Noor, Yusnita, Jamaludin, Zulikha

    Published 2014
    “…As a result of the lack of models and algorithms have been introduced in both parsers, the model and algorithm development phase is introduced in the design of BMTutor.Output from the development process shows that the prototype is able to provide sentence correction for all 15 invalid sentences and can produce parse tree visualizations for all 20 sentences used for prototype testing.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5
  6. 6

    Photogrammetric unmanned aerial vehicle for digital terrain model estimation under oil palm tree canopy area / Suzanah Abdullah by Abdullah, Suzanah

    Published 2021
    “…At this stage, this study has formulated a new methodology for estimating DTM production under tree canopy conditions based on tree crown estimation produced from the digital surface model (DSM) and subsequently, the tree height estimation was determined as the final process in the DTM implementation. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Prediction of Machine Failure by Using Machine Learning Algorithm by Fakhrurazi, Nur Amalina

    Published 2019
    “…Validation for the model is analyzed by using validation testing data and cross validation. …”
    Get full text
    Get full text
    Final Year Project
  8. 8
  9. 9
  10. 10

    Analysis on reading image through camera image by Amir Hamzah Ani

    Published 2024
    text::Final Year Project
  11. 11

    Performance analysis of downlink scheduling in 3GPP LTE system / Muhammad Haikal Hashim by Hashim, Muhammad Haikal

    Published 2014
    “…The service allows mobile users to access Internet through their devices. LTE intends to deliver higher speed data and multimedia services for the next generation. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Trust‑based lightweight security protocol for device to device multihop cellular communication (TLwS) by Adnan Shahid, Khan, Yasir, Javed, Johari, Abdullah, Kartinah, Zen

    Published 2021
    “…Besides basic function that is direct communication without the need of Base Station (BS), D2D allows small communicating device to act as intermediate device not only for forward the trafcs but also permits the sharing of resources such as spectrum, services, data and social contents for any users that are near the proximity range. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Predicting Student Performance in Object Oriented Programming Using Decision Tree : A Case at Kolej Poly-Tech Mara, Kuantan by Mohd Hanis, Rani, Abdullah, Embong

    Published 2013
    “…Using 10-fold cross validation for each algorithm, it was found that decision tree was the best algorithm with 83.6944% correctness. …”
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14

    Lightweight ECC Based Multifactor Authentication Protocol (LEMAP) for Device to Device Cellular Network by Rashad Mahmood, Saqib, Adnan Shahid, Khan

    Published 2022
    “…Device to Device (D2D) communication is a type of technology where two devices can communicate directly with each other without the need to contact Base Station or any central infrastructure. …”
    Get full text
    Get full text
    Thesis
  15. 15

    A novel ensemble decision tree-based CHi-squared Automatic Interaction Detection (CHAID) and multivariate logistic regression models in landslide susceptibility mapping by Althuwaynee, Omar F., Pradhan, Biswajeet, Park, Hyuck Jin, Lee, Jung Hyun

    Published 2014
    “…Then, the inventory was randomly split into two datasets, 70 % was used for training the models, and the remaining 30 % was used for validation purpose. …”
    Get full text
    Get full text
    Article
  16. 16

    A new compression algorithm for small data communication in wireless sensor network by Tuama, Ammar Yaseen, Mohamed, Mohamad Afendee, Muhammed, Abdullah, Mohd Hanapi, Zurina

    Published 2017
    “…In this paper, we propose a new lossless compression algorithm that can handle small data communication in WSNs. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    A corrosion prediction model for oil and gas pipeline using CMARPGA by Chern-Tong, H., Aziz, I.B.A.

    Published 2016
    “…This proposed prediction model named CMARGA is then enhanced by using genetic algorithm in order build an optimum decision tree. …”
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18

    Fuzzy Systems and Bat Algorithm for Exergy Modeling in a Gas Turbine Generator by Alemu Lemma, Tamiru, Mohd Hashim, Fakhruldin

    Published 2011
    “…The fuzzy models are trained applying locally linear model tree algorithm followed by a meta-heuristic nature inspired algorithm called bat algorithm. …”
    Get full text
    Conference or Workshop Item
  19. 19

    WURFL detection engine using cosine string similarity algortlhm / Illiasaak Ahmad ... [et al.] by Ahmad, Illiasaak, Anak Buja, Alya@Geogiana, Abdullah Sani, Anis Shobirin

    Published 2013
    “…At the end of this research, we will provide a device heterogeneity detection algorithm that provides accurate information in resolving the heterogeneous device detection issues.…”
    Get full text
    Get full text
    Research Reports
  20. 20

    Prediction of novel angiogenesis inhibitors using in silico method by Sulaiman, Abu Musa

    Published 2017
    “…The MACCS­ Decision Tree model was then subjected to external validation where 4 compounds; Shiraiachrome-A, 11, 11'-dideoxyverticilin, Quercetin and TKI-31, obtained from scientific literature were tested. …”
    Get full text
    Get full text
    Student Project