Results 61 to 70 of about 49,333 (314)
Web Attack Detection Using ID3 [PDF]
Decision tree learning algorithms have been successfully used in knowledge discovery. They use induction in order to provide an appropriate classification of objects in terms of their attributes, inferring decision tree rules. This paper reports on the use of ID3 to Web attack detection.
Víctor H. García +2 more
openaire +1 more source
Graduation is the final stage of learning process activities in college. Undergraduate study period in UNDIP’s academic regulations is scheduled in 8 semesters (4 years) or less and maximum of 14 semesters (7 years).
Dwi Ispriyanti, Abdul Hoyyi
doaj +1 more source
Research on Spatial and Dynamic Planning Methods for Settlement Buildings Based on Data Mining
Traditional settlements are widely concerned by academic circles for their unique settlement patterns, exquisite residential buildings, and rich historical and cultural connotations, and their protection and development is an important proposition for ...
Lin Chen +4 more
doaj +1 more source
BMP-Dependent Modulation of ROS Generation and Scavenging Controls Interdigital Cell Death. [PDF]
BMP signaling regulates ROS generation and scavenging to control interdigital cell death in the developing chicken limb, highlighting a balance between oxidative stress and tissue regression. ABSTRACT Programmed cell death during embryonic development plays a vital role in shaping limb morphology in amniotes.
Ono SF +11 more
europepmc +2 more sources
Improvement of ID3 Algorithm Implementation
ID3 algorithm is a classical algorithm in decision tree algorithm, commonly used in data mining. Owing to that spatial information data has the characteristics of large capacity and diversity, when ID3 algorithm does data mining for spatial information, in the process of generating decision tree, some nodes will appear special sample sets which the ...
Ming-hao LIU, Nan LIU, Wei SHANG
openaire +2 more sources
Trigonometric words ranking model for spam message classification
Abstract The significant increase in the volume of fake (spam) messages has led to an urgent need to develop and implement a robust anti‐spam method. Several of the current anti‐spam systems depend mainly on the word order of the message in determining the spam message, which results in the system's inability to predict the correct type of message when
Suha Mohammed Hadi +7 more
wiley +1 more source
Depletion of ID3 enhances mesenchymal stem cells therapy by targeting BMP4 in Sjögren’s syndrome
Mesenchymal stem cell (MSCs) transplantation has been used to treat Sjögren’s syndrome (SS) based on the immunoregulatory properties of MSCs. However, the effectiveness need improving and its underlying intrinsic mechanisms remain largely unknown.
Lei Hu +10 more
semanticscholar +1 more source
Monitoring circulating tumor DNA (ctDNA) in patients with operable breast cancer can reveal disease relapse earlier than radiology in a subset of patients. The failure to detect ctDNA in some patients with recurrent disease suggests that ctDNA could serve as a supplement to other monitoring approaches.
Kristin Løge Aanestad +35 more
wiley +1 more source
Inhibitors of differentiation/DNA binding (Id) proteins are crucial for inner ear development, but whether Id mutations affect middle ear function remains unknown.
Qingyin Zheng +8 more
doaj +1 more source
Development and calibration of a cost-effective temperature sensor [PDF]
Oceanographic sensors are accurate and reliable but very expensive.
Almécija, Ana +3 more
core

