Search Results - (( new location ((model algorithm) OR (modified algorithm)) ) OR ( _ application tree algorithm ))*
Search alternatives:
- application tree »
- tree algorithm »
- new location »
-
1
Classification model for hotspot occurrences using a decision tree method
Published 2011“…This work demonstrates the application of a decision tree algorithm, namely the C4.5 algorithm, to develop a classification model from forest fire data in the Rokan Hilir district, Indonesia. …”
Get full text
Get full text
Get full text
Article -
2
Extended spatial decision tree algorithm for classifying hotspot occurrence
Published 2013“…The accuracy of decision tree generated by the ID3 and C4.5 algorithm is 49.02% and 65.24%, respectively. Meanwhile, the accuracy of the logistic regression model is 68.63%. …”
Get full text
Get full text
Thesis -
3
A new multicast-based architecture to support host mobility in IPv6
Published 2003“…As the mobile node moves to a new location, it joins the multicast group through the new location and prunes through the old location. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
4
Amtree Protocol Enhancement by Multicast Tree Modification and Incorporation of Multiple Sources
Published 2008“…In mobile environment, when the source is mobile and migrates to a new location, the multicast tree needs to be rebuilt. …”
Get full text
Get full text
Thesis -
5
A new multicast-based architecture to support host mobility in IPv6
Published 2003“…As the mobile node moves to a new location, it joins the multicast group through the new location and prunes through the old location. …”
Get full text
Get full text
Conference or Workshop Item -
6
Modified Data Encryption Standard Algorithm for Textbased Applications
Published 2006“…The purpose of this thesis is to introduce and demonstrate a new algorithm for Internet and e-mail security. …”
Get full text
Get full text
Thesis -
7
Multi-objective Binary Clonal Selection Algorithm In The Retrieval Phase Of Discrete Hopfield Neural Network With Weighted Systematic Satisfiability
Published 2024“…The newly proposed logical rule and the algorithm will be the components in the logic mining model namely Weighted Systematic 2 Satisfiability Modified Reverse Analysis. …”
Get full text
Get full text
Thesis -
8
Location determination using radio frequency RSSI and deterministic algorithm
Published 2008Get full text
Get full text
Conference or Workshop Item -
9
Modified ant colony optimization algorithms for deterministic and stochastic inventory routing problems / Lily Wong
Published 2018“…The computational results show that the algorithms which implement this new formulation are able to produce better solutions. …”
Get full text
Get full text
Get full text
Thesis -
10
Recommendation System Model For Decision Making in the E-Commerce Application
Published 2024thesis::doctoral thesis -
11
Landslide susceptibility mapping using decision-tree based chi-squared automatic interaction detection (CHAID) and logistic regression (LR) integration
Published 2014“…An area under the curve (AUC) was used to test the model reliability and prediction capability with the training and validation landslide locations respectively. …”
Get full text
Get full text
Conference or Workshop Item -
12
A greedy heuristics multiple criteria model for solving multi-landfill site selection and plant propagation algorithm for improving waste collection vehicle routing solutions
Published 2023“…First, the importance levels of LSSP criteria including the operational cost criterion were determined by using a modified analytical hierarchy process. Then, a multiple criteria greedy heuristic model was proposed to construct WCVRP solutions and to find a new landfill site(s) with the minimum total operational costs. …”
Get full text
Get full text
Get full text
Thesis -
13
Named entity recognition using a new fuzzy support vector machine.
Published 2008“…Some of the Machine learning algorithms used in NER methods are, support vector machine(SVM), Hidden Markov Model, Maximum Entropy Model (MEM) and Decision Tree. …”
Get full text
Get full text
Article -
14
Enhanced Steganography Framework Based On Lossless Compression And Histogram
Published 2024“…The compression model was modified to include a hybrid lossless text compression algorithm to reduce redundant secret information and boost embedding capacity. …”
Get full text
Get full text
Thesis -
15
Power line corridor vegetation encroachment detection from satellite images using retinanet and support vector machine
Published 2023“…In this dissertation, a new vegetation encroachment detection method was proposed by studying the feasibility of using the visible-light band of highresolution satellite images using the RetinaNet deep learning model and Support Vector Machine algorithm (SVM). …”
text::Thesis -
16
An approach to enhance the structural operational deflection shape under random ambient excitation through mode shape expansion / Muhamad Azhan Anuar
Published 2021“…(iii) An expansion approach was applied by a linear combination of both OMA and FE mode shapes data using the modified LCP method (iv) A new algorithm that includes the selection matrix and rotation matrix were used to obtain the estimated experimental mode shape at higher DOFs. …”
Get full text
Get full text
Thesis -
17
-
18
-
19
Modified hybrid median filter for removal of low density random-valued impulse noise in images / Dr. Siti Noraini Sulaiman ... [et al.]
Published 2017“…The FIN model is easier to restore compared to RVIN model as the RVIN normally occurs randomly across the image. …”
Get full text
Get full text
Research Reports -
20
Extreme learning machine for user location prediction in mobile environment
Published 2011“…This work examines the location determination techniques by attempting to determine the location of mobile users by taking advantage of SS and SQ history data and modeling the locations using the ELM algorithm. …”
Get full text
Get full text
Get full text
Article
