Search Results - (( consumer detection path algorithm ) OR ( java application mining algorithm ))

  • Showing 1 - 17 results of 17
Refine Results
  1. 1
  2. 2
  3. 3

    Test case generation from state machine with OCL constraints using search-based techniques / Aneesa Ali Ali Saeed by Aneesa Ali, Ali Saeed

    Published 2017
    “…The results show that the proposed infeasible path detection method was efficient and detect 99 percent of the infeasible paths in the three industrial systems. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Mining Sequential Patterns Using I-PrefixSpan by Dhany , Saputra, Rambli Dayang, R.A., Foong, Oi Mean

    Published 2007
    “…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    Test case minimization applying firefly algorithm by Hashim, Nor Laily, Dawood, Yasir Salman

    Published 2018
    “…The proposed test case minimization method has the following steps: provide weight to the paths, calculate path coverage for each path, transform an immediate graph into an adjacency matrix, which later is used to apply firefly algorithm and generate optimal test cases. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    A web-based implementation of k-means algorithms by Lee, Quan

    Published 2022
    “…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  8. 8
  9. 9

    Development of a prototype solar-powered autonomous vehicle prototype with object detection and avoidance system using Raspberry-Pi by Ogonye, O. Solomon, Dagwa Ishaya Musa, Nurudeen Abdulhakeem Hassan, Okonkwo, Emmanuel, Kulutuye, Precious

    Published 2024
    “…The vehicle uses ultrasonic sensors and a USB webcam to detect and avoid obstacles on its path with the aid of a Raspberry Pie program that effectively executes decision-making changes to manoeuvre the vehicle away from objects on a free path. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Surface defect detection and polishing parameter optimization using image processing for G3141 cold rolled steel by Zamri, Ruzaidi

    Published 2016
    “…To realize this, automatic cropping algorithm is developed to detect the region of interest and interpret the Ga value. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
    Get full text
    Get full text
    Thesis
  12. 12

    Dynamic transmit antenna shuffling scheme for hybrid multiple-input multiple-output in layered architecture by Chong, Jin Hui

    Published 2010
    “…It is shown that the computational complexity of proposed FAST-QR detection algorithm is approximately 48 % lower than the conventional QR decomposition detection algorithm. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Motion estimation on homogenous surface for around view monitoring system by Hanizam, Syahirah, Nik Hashim, Nik Nur Wahidah, Zainal Abidin, Zulkifli, Mohd Zaki, Hasan Firdaus, Abdul Rahman, Hasbullah, Mahamud, Nurul Hidayah

    Published 2020
    “…However, block matching algorithm based on normalized cross-correlation (CCORR NORMED) and normalised correlation coefficient (CCOEFF NORMED) were able to detect all templates correctly with 0% of false detection on our dataset.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  14. 14

    Fuzzy logic based link status classification for efficient multipath routing in multi-hop wireless mesh networks by Shah, P.A., Hasbullah, H.B., Rafique, S., Rehman, S.U., Jung, L.T.

    Published 2014
    “…However, in infrastructure and the client part of WMN movement of nodes still creates delay as path failure detection and re-establishment consumes considerable time. …”
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15

    Precise ICMP Traceback Based On Normal Flow Filtration in Denial of Services Attack by Izaddoost, Alireza

    Published 2008
    “…Intention-driven model, a sampling traceback technique, provides information about the attack flow and able to reconstruct the attack path to the source of attack by the aid of Intrusion Detection system (IDS). …”
    Get full text
    Get full text
    Thesis
  16. 16

    Evolutionary cost-cognizant regression test case prioritization for object-oriented programs by Bello, AbdulKarim

    Published 2019
    “…Afterward evolutionary algorithm (EA) was employed to prioritize test cases based on the rate severity of fault detection per unit test cost. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Development of high speed booth multiplier with optimized stuck-at fault implementation by Mohammed Khalid, Muhammad Nazir, Wan Hasan, Wan Zuha, Sulaiman, Nasri, Wagiran, Rahman

    Published 2002
    “…Deterministic technique will be used to detect failure circuit base on test pattern generation. …”
    Get full text
    Get full text
    Conference or Workshop Item