Results 11 to 20 of about 16,307 (199)
Classification Algorithm of Well Leakage Type Based on Optimized ID3 [PDF]
When the decision tree algorithm is used in well leakage classification,the classification effect is not satisfactory because of the large proportion of multi-valued attributes after the well leakage data is discretized,and because the algorithm has the ...
LI Jian,FU Xiaobin,WU Yuanyuan
doaj +1 more source
Employee Performance Assessment Using Modified Decision Tree [PDF]
Decision tree algorithms are famous method in inductive learning and successfully applied for model classification and prediction. Performance evaluation in organization is one of the most important issues that are reliable due to the transition from ...
Hassan Jeiad, Zinah Ameen, Alza Mahmood
doaj +1 more source
Research on Spatial and Dynamic Planning Methods for Settlement Buildings Based on Data Mining
Traditional settlements are widely concerned by academic circles for their unique settlement patterns, exquisite residential buildings, and rich historical and cultural connotations, and their protection and development is an important proposition for ...
Lin Chen +4 more
doaj +1 more source
Trigonometric words ranking model for spam message classification
Abstract The significant increase in the volume of fake (spam) messages has led to an urgent need to develop and implement a robust anti‐spam method. Several of the current anti‐spam systems depend mainly on the word order of the message in determining the spam message, which results in the system's inability to predict the correct type of message when
Suha Mohammed Hadi +7 more
wiley +1 more source
Classification of Images Using Decision Tree [PDF]
In this paper, the proposed system is based on texture features classification for multi object images by using decision tree (ID3) algorithm. The proposed system uses image segment tile base to reduce the block effect and uses (low low) Wavelet Haar to ...
Emad K. Jabbar, Mayada jabbar kelain
doaj +1 more source
Anomaly Detection and Attack Classification for Train Real-Time Ethernet
Real-time Ethernet has been applied to train control and management system (TCMS) of 250km/h Fuxing Electric Multiple Units (EMUs) and some urban rail vehicles.
Ruifeng Duo +4 more
doaj +1 more source
An extended ID3 decision tree algorithm for spatial data [PDF]
Utilizing data mining tasks such as classification on spatial data is more complex than those on non-spatial data. It is because spatial data mining algorithms have to consider not only objects of interest itself but also neighbours of the objects in ...
Sitanggang, Imas Sukaesih +3 more
core +5 more sources
Intrusion Detection System Based on Decision Tree and Clustered Continuous Inputs [PDF]
With the rapid expansion of computer networks during the past decade, security has become a crucial issue for computer systems. Different soft-computing based methods have been proposed in recent years for the development of intrusion detection systems ...
Adel Issa
doaj +1 more source
The aim of this study was to characterise all the goal scoring patterns during open play (elaborate attacks versus counterattacks) related to zone pitch division and the number of players involved in the 2018 FIFA World Cup in Russia.
Joaquin Cerda +6 more
doaj +1 more source
Data science is currently one of the most promising fields used to support the decision-making process. Particularly, data streams can give these supportive systems an updated base of knowledge that allows experts to make decisions with updated models ...
Nuria Mollá +4 more
doaj +1 more source

