Search Results - (( new location ((model algorithm) OR (modified algorithm)) ) OR ( _ application tree algorithm ))*

Refine Results
  1. 1

    Classification model for hotspot occurrences using a decision tree method by Sitanggang, Imas Sukaesih, Ismail, Mohd Hasmadi

    Published 2011
    “…This work demonstrates the application of a decision tree algorithm, namely the C4.5 algorithm, to develop a classification model from forest fire data in the Rokan Hilir district, Indonesia. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Extended spatial decision tree algorithm for classifying hotspot occurrence by Sitanggang, Imas Sukaesih

    Published 2013
    “…The accuracy of decision tree generated by the ID3 and C4.5 algorithm is 49.02% and 65.24%, respectively. Meanwhile, the accuracy of the logistic regression model is 68.63%. …”
    Get full text
    Get full text
    Thesis
  3. 3

    A new multicast-based architecture to support host mobility in IPv6 by M. Ali, Borhanuddin, Habaebi, Mohamed Hadi, AI-Talib, Sahar

    Published 2003
    “…As the mobile node moves to a new location, it joins the multicast group through the new location and prunes through the old location. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  4. 4

    Amtree Protocol Enhancement by Multicast Tree Modification and Incorporation of Multiple Sources by Al‐Sharafi, Ali Mohammed Ali

    Published 2008
    “…In mobile environment, when the source is mobile and migrates to a new location, the multicast tree needs to be rebuilt. …”
    Get full text
    Get full text
    Thesis
  5. 5

    A new multicast-based architecture to support host mobility in IPv6 by Mohd Ali, Borhanuddin, Habaebi, Mohamed Hadi, Al-Talib, Sahar Abdul Aziz

    Published 2003
    “…As the mobile node moves to a new location, it joins the multicast group through the new location and prunes through the old location. …”
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    Modified Data Encryption Standard Algorithm for Textbased Applications by Mohamed Khmag, Asem Ib.

    Published 2006
    “…The purpose of this thesis is to introduce and demonstrate a new algorithm for Internet and e-mail security. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Multi-objective Binary Clonal Selection Algorithm In The Retrieval Phase Of Discrete Hopfield Neural Network With Weighted Systematic Satisfiability by Romli, Nurul Atiqah

    Published 2024
    “…The newly proposed logical rule and the algorithm will be the components in the logic mining model namely Weighted Systematic 2 Satisfiability Modified Reverse Analysis. …”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9

    Modified ant colony optimization algorithms for deterministic and stochastic inventory routing problems / Lily Wong by Lily , Wong

    Published 2018
    “…The computational results show that the algorithms which implement this new formulation are able to produce better solutions. …”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11

    Landslide susceptibility mapping using decision-tree based chi-squared automatic interaction detection (CHAID) and logistic regression (LR) integration by Althuwaynee, Omar F., Pradhan, Biswajeet, Ahmad, Noordin

    Published 2014
    “…An area under the curve (AUC) was used to test the model reliability and prediction capability with the training and validation landslide locations respectively. …”
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12

    A greedy heuristics multiple criteria model for solving multi-landfill site selection and plant propagation algorithm for improving waste collection vehicle routing solutions by Nur Azriati, Mat

    Published 2023
    “…First, the importance levels of LSSP criteria including the operational cost criterion were determined by using a modified analytical hierarchy process. Then, a multiple criteria greedy heuristic model was proposed to construct WCVRP solutions and to find a new landfill site(s) with the minimum total operational costs. …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    Named entity recognition using a new fuzzy support vector machine. by Mansouri, Alireza, Affendy, Lilly Suriani, Mamat, Ali

    Published 2008
    “…Some of the Machine learning algorithms used in NER methods are, support vector machine(SVM), Hidden Markov Model, Maximum Entropy Model (MEM) and Decision Tree. …”
    Get full text
    Get full text
    Article
  14. 14

    Enhanced Steganography Framework Based On Lossless Compression And Histogram by Kasasbeh, Dima Suliman Mohammad

    Published 2024
    “…The compression model was modified to include a hybrid lossless text compression algorithm to reduce redundant secret information and boost embedding capacity. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Power line corridor vegetation encroachment detection from satellite images using retinanet and support vector machine by Fathi Mahdi Elsiddig Haroun, Mr.

    Published 2023
    “…In this dissertation, a new vegetation encroachment detection method was proposed by studying the feasibility of using the visible-light band of highresolution satellite images using the RetinaNet deep learning model and Support Vector Machine algorithm (SVM). …”
    text::Thesis
  16. 16

    An approach to enhance the structural operational deflection shape under random ambient excitation through mode shape expansion / Muhamad Azhan Anuar by Anuar, Muhamad Azhan

    Published 2021
    “…(iii) An expansion approach was applied by a linear combination of both OMA and FE mode shapes data using the modified LCP method (iv) A new algorithm that includes the selection matrix and rotation matrix were used to obtain the estimated experimental mode shape at higher DOFs. …”
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18
  19. 19
  20. 20

    Extreme learning machine for user location prediction in mobile environment by Mantoro, Teddy, Olowolayemo, Akeem, Olatunji, Sunday O., Ayu, Media A., Abu Osman, Md. Tap

    Published 2011
    “…This work examines the location determination techniques by attempting to determine the location of mobile users by taking advantage of SS and SQ history data and modeling the locations using the ELM algorithm. …”
    Get full text
    Get full text
    Get full text
    Article