Results 11 to 20 of about 4,806,455 (222)

ID3 algorithm approach for giving scholarships [PDF]

open access: yesJournal of Physics: Conference Series, 2019
Universitas Maarif Hasyim Latif (UMAHA) is a College that organizes scholarship programs for its students. However, in the implementation of the program, some problems occur, namely the University has difficulty in making decisions, and a large number of student data applying for scholarships causes a long time to select the process. So, we need a tool/
Inderawati   +21 more
openaire   +2 more sources

IDS with Hybrid ID3 Algorithm

open access: bronzeInternational Journal of Computer Applications, 2013
An intrusion detection system (IDS) is a device or software application that monitors network and/or system behavior for malicious activities or policy violations and produces reports to a Management Station. In this project we design and implement an IDS that is a software application and monitor network through a client server approach and to detect ...
Suman Singh
openaire   +3 more sources

An extended ID3 decision tree algorithm for spatial data [PDF]

open access: greenProceedings 2011 IEEE International Conference on Spatial Data Mining and Geographical Knowledge Services, 2011
Utilizing data mining tasks such as classification on spatial data is more complex than those on non-spatial data. It is because spatial data mining algorithms have to consider not only objects of interest itself but also neighbours of the objects in order to extract useful and interesting patterns.
Sitanggang, Imas Sukaesih   +3 more
openaire   +3 more sources

An Efficient Trust Management Technique Using ID3 Algorithm With Blockchain in Smart Buildings IoT

open access: yesIEEE Access, 2023
Because of the rising population density, relationships are necessary to raise living standards through sending and receiving a wide range of services.
Fathe Jeribi   +3 more
doaj   +2 more sources

ID3 algorithm and its improved algorithm in agricultural planting decision

open access: yesIOP Conference Series: Earth and Environmental Science, 2020
Abstract With the advent of the era of 5G big data, it is not only necessary to mine valid data in mass information, but also to classify it. Mining and classifying information can be used as an important basis for decision making.
Qiang Huang, Lin Sun, Guangping Qiang
openaire   +3 more sources

Classification of Thyroid Class using ID3 Algorithm and Artificial Neural Network (ANN)

open access: diamondSistemasi: Jurnal Sistem Informasi
Thyroid disease refers to a range of conditions or issues affecting the thyroid gland. This gland, located below the Adam’s apple, is responsible for coordinating various metabolic processes in the body, making its function essential.
Nabila Henisaniyya   +4 more
doaj   +2 more sources

The Application of Generating Fuzzy ID3 Algorithm in Performance Evaluation

open access: goldProcedia Engineering, 2012
AbstractPerformance evaluation is an important part of human resource management and the core of performance management, so the choice of evaluation methods is essential. The common methods are graphic rating scale, force distribution, behaviorally anchored rating scale, management by objectives, 360-degree evaluation method and so on.
Yan Li, Dandan Jiang, Fa-Chao Li
openaire   +3 more sources

Identifying the Risky SNP of Osteoporosis with ID3-PEP Decision Tree Algorithm [PDF]

open access: goldComplexity, 2017
In the past 20 years, much progress has been made on the genetic analysis of osteoporosis. A number of genes and SNPs associated with osteoporosis have been found through GWAS method.
Jincai Yang   +5 more
doaj   +2 more sources

Design and Analysis System of KNN and ID3 Algorithm for Music Classification based on Mood Feature Extraction

open access: hybrid, 2017
Each of music which has been created, has its own mood which is emitted, therefore, there has been many researches in Music Information Retrieval (MIR) field that has been done for recognition of mood to music.
Made Sudarma, I Gede Harsemadi
openalex   +3 more sources

Application of ID3 Algorithm in Information Asset Identification [PDF]

open access: goldProceedings of 2012 National Conference on Information Technology and Computer Science, 2012
In the issue of information security risk evaluation, the asset, the threat and the vulnerability are the three most important elements. Information asset identification is a primary link of information security risk evaluation process. In this paper, the decision tree algorithm was applied into the identification of information assets; the basic ...
Yong Hua, Yunlong Zhang
openaire   +4 more sources

Home - About - Disclaimer - Privacy