Search Results - (( developing integrator perceptions algorithm ) OR ( java application mining algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Mining Sequential Patterns Using I-PrefixSpan by Dhany , Saputra, Rambli Dayang, R.A., Foong, Oi Mean

    Published 2007
    “…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    A web-based implementation of k-means algorithms by Lee, Quan

    Published 2022
    “…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  6. 6
  7. 7

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
    Get full text
    Get full text
    Thesis
  8. 8

    Risk perception modeling based on physiological and emotional responses / Ding Huizhe by Ding , Huizhe

    Published 2024
    “…Therefore, accurate risk perception has become vital. This research aims to develop models for objectively assessing perceived risk. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    Modeling heterogeneous behaviors with different strategies in a terrorist attack by Le Bi, Tingting Liu, Zhen Liu, Jason Teo, Yumeng Zhao, Yanjie Chai

    Published 2022
    “…We constructed an emotional model that integrated personality and visual perception for pedestrians. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Digital Surface Model (DSM) Construction and Flood Hazard Simulation for Development Plans in Naga City, Philippines by Abd Rahman, Muhammad Zulkarnain, Dinand, Alkema

    Published 2007
    “…Finally the Digital Surface Model (DSM) of the study area was constructed by integrating both man-made and natural terrains. The DSM was also generated to simulate the new developments in Naga City. …”
    Get full text
    Get full text
    Article
  11. 11
  12. 12

    Grammar-based prosody modification for explicit control Malay language storytelling speech synthesis / Muhammad Izzad Ramli by Ramli, Muhammad Izzad

    Published 2018
    “…Based on the prosody analysis, a grammar-based prosody modification rules are proposed by integrating grammatical structure. Consequently, new rules and algorithm that is MustFront rule, limitation rule, and two-steps pitch contour algorithm are introduced to increase the synthesized speech quality. …”
    Get full text
    Get full text
    Thesis
  13. 13

    A kinematic concept for robotic assisted dental rehabilitation / Muhammad Azmi Ayub... [et al.] by Ayub, Muhammad Azmi, Azni, Mohd Shafiq, Al-Jaf, Nagham, Norman, Noraina Hafizan

    Published 2017
    “…The key elements in the concept consist of cone-beam computed tomography machine (CBCT), image processing algorithm and a robot manipulator system, which will function as an integrated unit to aid and guide the dentist in the diagnosis and treatment procedures. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Quantifying and assessing post-stroke patients' functional capability level for independent daily activities: a review by Abd Mutalib, Mohd Azri, Zainul Azlan, Norsinnira, Norsahperi, Nor Mohd Haziq

    Published 2025
    “…It delves into the existing standards of clinical assessment, explores the integration of sensors in limb rehabilitation prototypes, and observes the mathematical methods and algorithms employed by previous researchers to assess and quantify stroke patients' functional capability automatically. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    A rule-based image segmentation method and neural network model for classifying fruit in natural environment / Hamirul'aini Hambali by Hambali, Hamirul'aini

    Published 2015
    “…Therefore, another segmentation method has been developed to address the problem. The new method, named as Adaptive K-means, is developed based on clustering approach. …”
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17

    Quantifying and assessing post-stroke patients' functional capability level for independent daily activities: a review by Abd Mutalib, Mohd Azri, Zainul Azlan, Norsinnira, Norsahperi, Nor Mohd Haziq

    Published 2025
    “…It delves into the existing standards of clinical assessment, explores the integration of sensors in limb rehabilitation prototypes, and observes the mathematical methods and algorithms employed by previous researchers to assess and quantify stroke patients' functional capability automatically. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  18. 18
  19. 19

    A review of automatic driving target detection based on camera and millimeter wave radar fusion technology by Tao, Zhenhua, Ngui, Wai Keng

    Published 2025
    “…Future research should focus on developing comprehensive multimodal datasets, 4D millimeter-wave radar, and refining fusion algorithms for robustness in diverse environments. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    An enhance embedding method using edge and textures detection for image steganography by Al-Maliki, Alaa Jabbar Qasim

    Published 2024
    “…The study contributes both theoretically and practically to the field of steganography by developing an innovative algorithm that enhances the security and robustness of image hidden data. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis