Search Results - (( developing emerging self algorithm ) OR ( java application mining algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Mining Sequential Patterns Using I-PrefixSpan by Dhany , Saputra, Rambli Dayang, R.A., Foong, Oi Mean

    Published 2007
    “…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    A web-based implementation of k-means algorithms by Lee, Quan

    Published 2022
    “…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  6. 6
  7. 7

    The development of a tracking algorithm for ambulance detection using squaring of RGB and HSV color processing techniques by Mohammad Syawaludin Syafiq, Hassan

    Published 2016
    “…In this study, a tracking algorithm is developed by means of image processing technique in detecting ambulance. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
    Get full text
    Get full text
    Thesis
  9. 9

    Iot health monitoring system for self quarantined covid-19 patients by Vikneswaran, Balakrishnan

    Published 2022
    “…This study focuses fully on the development of a system of monitoring the health data of Covid-19 patients who undergoing self-quarantine by means of data classification. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  10. 10

    Improved abnormal detection using self-adaptive social force model for visual surveillance by Wan Nur Azhani, W. Samsudin

    Published 2017
    “…The estimation of the good quality of interaction forces is critical in this case and has not been explored yet. So, Self-Adaptive SFM is developed in order to estimate a good quality of interaction forces since it is crucial to achieve better abnormal detection, which represents the behavior of the crowd. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Traffic monitoring system with emergency support using SOM by Tan, Hoai Thang

    Published 2020
    “…This paper proposed a system of emergency notification to alert the driver. By using SelfOrganizing Map technique, the ambulance siren can be localized based on the detected ambulance siren. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  12. 12

    Three-dimensional coverage control for multi-unmanned aerial vehicle by Siow, Wen Hao

    Published 2024
    “…This study proposes a 3D coverage control algorithm to address complex real-world scenarios, wherein the 3D control algorithm will be developed based on the 2D MBC scheme. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  13. 13

    Quantum-Inspired Multidirectional Associative Memory With a Self-Convergent Iterative Learning by Masuyama, Naoki, Loo, Chu Kiong, Seera, Manjeevan, Kubota, Naoyuki

    Published 2018
    “…Quantum-inspired computing is an emerging research area, which has significantly improved the capabilities of conventional algorithms. …”
    Get full text
    Get full text
    Article
  14. 14

    MBIST implementation and evaluation in FPGA based on low-complexity March algorithms by Jidin, Aiman Zakwan, Mispan, Mohd Syafiq, Hussin, Razaidi, Weng, Fook Lee

    Published 2024
    “…March algorithms are widely used in Memory Built-In Self-Test (MBIST) on-chip memory testing, providing linear test complexities that reduce the test time and cost. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Computational methods for self-assembly of DNA nanostructures / Ong Hui San by Ong, Hui San

    Published 2016
    “…Several approaches have been adopted including development of an autonomous tool that incorporated evolutionary optimization algorithm in constructing these heterogeneous DNA shapes and the application of heuristic through undirected graph theory as an annotation schema to produce the connectivity maps. …”
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17

    An improved negative selection algorithm based on the hybridization of cuckoo search and differential evolution for anomaly detection by Ayodele Nojeem, Lasisi

    Published 2018
    “…These randomly generated detectors suffer from not been able to adequately cover the non-self space, which diminishes the detection performance of the V-Detectors algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    SwiftCare: specialist appointment system by Yasir, Nurul Shafika Natasha

    Published 2025
    “…This system incorporates the use that mention real-time appointment scheduling, the capability to customize self-service on individual events, emergency appointment preferences, and compatibility with electronic medical records and scheduling appointments to coordinate patient influx in an effective manner. …”
    Get full text
    Get full text
    Student Project
  19. 19

    Human evacuation movement simulation model: Concepts and techniques by Noor Akma, Abu Bakar, Lim, Siew Mooi, Abdul Majid, Mazlina

    Published 2022
    “…A program with a running algorithm of a computer model is called a computer simulation. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20

    Human evacuation movement simulation model: Concepts and techniques by Noor Akma, Abu Bakar, Lim, Siew Mooi, Abdul Majid, Mazlina

    Published 2022
    “…A program with a running algorithm of a computer model is called a computer simulation. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item