Search Results - (( developing emerging force algorithm ) OR ( java application mining algorithm ))

  • Showing 1 - 20 results of 20
Refine Results
  1. 1
  2. 2
  3. 3

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Mining Sequential Patterns Using I-PrefixSpan by Dhany , Saputra, Rambli Dayang, R.A., Foong, Oi Mean

    Published 2007
    “…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    A web-based implementation of k-means algorithms by Lee, Quan

    Published 2022
    “…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  6. 6
  7. 7

    A microscopic swarm model simulation and fractal approach towards swarm agent behaviour by Widyarto, Setyawan, Abd. Latiff, Muhammad Shafie

    Published 2006
    “…A physical based microscopic agent simulation model has been developed. The developed microscopic agent simulation model is a physical force based model similar to the social force model with forward and repulsion forces as the main force driver. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Improved abnormal detection using self-adaptive social force model for visual surveillance by Wan Nur Azhani, W. Samsudin

    Published 2017
    “…So, Self-Adaptive SFM is developed in order to estimate a good quality of interaction forces since it is crucial to achieve better abnormal detection, which represents the behavior of the crowd. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
    Get full text
    Get full text
    Thesis
  10. 10

    Development of airbag suit system for motorcyclist by Zainal Abidin, Zulkifli, Razali, Fakhruddin

    Published 2014
    “…The project involved development of a control algorithm for the airbag inflation and performing analysis on the finished prototype. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Simulation Based Analysis of Kinematics, Dynamics and Control of Space Robots by Sultana, Shafina

    Published 1996
    “…In the masterslave control environment study, several considerations were taken into account, like the master and slave arm configuration, telemonitoring force feedback algorithm, and dynamic characteristics of master and slave arm. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Human evacuation movement simulation model: Concepts and techniques by Noor Akma, Abu Bakar, Lim, Siew Mooi, Abdul Majid, Mazlina

    Published 2022
    “…A program with a running algorithm of a computer model is called a computer simulation. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    Human evacuation movement simulation model: Concepts and techniques by Noor Akma, Abu Bakar, Lim, Siew Mooi, Abdul Majid, Mazlina

    Published 2022
    “…A program with a running algorithm of a computer model is called a computer simulation. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14

    Development of DNA-based dynamic key-dependent block cipher by Saeed, Auday H.

    Published 2015
    “…Hence, it is necessary to research and develop a secure symmetric cipher algorithm. Since the declaration of Rijndael as AES this cipher has been the target of many attacks, and the attempts to break it are ongoing and even increasing everyday by taking advantage of the rapid development in computing capabilities. …”
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16

    Study on effect of abs control system to the vehicle dynamic behavior during braking on various speed and road condition by Muhamad Zulhilmi, Ismail

    Published 2021
    “…Furthermore, with the development of the mathematical model in this research, various ABS algorithms to improve the effectiveness of ABS on the vehicle can be done in future studies.…”
    Get full text
    Get full text
    Thesis
  17. 17

    Computational methods for self-assembly of DNA nanostructures / Ong Hui San by Ong, Hui San

    Published 2016
    “…Several approaches have been adopted including development of an autonomous tool that incorporated evolutionary optimization algorithm in constructing these heterogeneous DNA shapes and the application of heuristic through undirected graph theory as an annotation schema to produce the connectivity maps. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Al-Istikhlāf framework in the age of artificial intelligence: reclaiming the human identity and responsibility in the digital era by Wan Ismail, Hidayah, Abdelaziz, Berghout

    Published 2025
    “…Artificial intelligence (AI) has emerged as one of the most disruptive forces of the twenty-first century, reshaping cultures, economies, social relations, and even the definition of human intelligence, creativity, and knowledge. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Machine learning application in predicting anterior cruciate ligament injury among basketball players by Longfei, Guo

    Published 2025
    “…Four machine learning algorithms—Random Forest (RF), Support Vector Machine (SVM), eXtreme Gradient Boosting (XGBoost), and Logistic Regression (LR)—were developed to predict ACL injury. …”
    Get full text
    Get full text
    Thesis
  20. 20