Search Results - (( developing interactive block algorithm ) OR ( java application mining algorithm ))

  • Showing 1 - 20 results of 20
Refine Results
  1. 1
  2. 2
  3. 3

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Mining Sequential Patterns Using I-PrefixSpan by Dhany , Saputra, Rambli Dayang, R.A., Foong, Oi Mean

    Published 2007
    “…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    A web-based implementation of k-means algorithms by Lee, Quan

    Published 2022
    “…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  6. 6
  7. 7

    Secure block cipher inspired by the human immune system by Ariffin, Suriyani

    Published 2012
    “…As for Malaysia, it is an advantage if we can develop our own symmetric block cipher for our national security interest. …”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9

    Real-time interactive spatial augmented reality (RISAR) platform by Chan, Aye Zay Hta

    Published 2022
    “…The main contributions of this Real-time Interactive Spatial Augmented Reality (RISAR) platform include (i) an algorithm that supports real-time physical structure reconstruction using Lego blocks and projection mapping, and (ii) a design of a SAR platform with low-cost and easily accessible hardware and software. …”
    Get full text
    Thesis
  10. 10

    Identifying the influential spreaders in multilayer interactions of online social networks by Al-Garadi, M.A., Varathan, Kasturi Dewi, Ravana, S.D., Ahmed, E., Chang, V.

    Published 2016
    “…The results analysis concluded that improving the accuracy of influential spreaders identification in OSNs is not only by improving identification algorithms but also by developing a network topology that represents the information diffusion well. …”
    Get full text
    Get full text
    Article
  11. 11

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
    Get full text
    Get full text
    Thesis
  12. 12

    Accident Prevention Block to Move an Automobile From Traffic Collision by Rajiv, Charles Samuel

    Published 2019
    “…In the present work, an attempt has been made to propose an accident prevention block in automobiles that can sense the tired/sleepy driver via a camera and algorithms, to maneuver the vehicle to safety. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Hardware Simulator for Seizure, Preseizure and Normal Mode Signal Generation in LabVIEW Environment for Research by Qidwai, Uvais, Malik, Aamir Saeed, Shakir, Mohamed, Kamel, Nidal

    Published 2013
    “…Currently numerous theories and model have been developed to associate various findings or in relating EEG patterns to develop a software simulator. …”
    Get full text
    Get full text
    Get full text
    Non-Citation Index Journal
  14. 14

    An evaluation of Monte Carlo-based hyper-heuristic for interaction testing of industrial embedded software applications. by S. Ahmed, Bestoun, Enoiu, Eduard, Afzal, Wasif, Kamal Z., Zamli

    Published 2020
    “…We applied Q-EMCQ on 37 real-world industrial programs written in Function Block Diagram (FBD) language, which is used for developing a train control management system at Bombardier Transportation Sweden AB. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    A region-based Principal Component Analysis (PCA) technique for medical image compression by Lim, Sin Ting

    Published 2022
    “…In an effort to improve rate-distortion performance, this work proposed a block-to-row PCA (BTRPCA) algorithm that employs the eigenvectors from the model image of the same image modality coupled with a row vectorization approach. …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    Arfict: Indoor navigation mobile application using augmented reality (AR) for FICT by Lee, Chorng Huah

    Published 2025
    “…Hence, the ARFICT project aims to develop an Augmented Reality (AR)-based indoor navigation system for the FICT building at UTAR, providing a real-time, interactive navigation experience that enhances wayfinding in complex indoor environments. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  17. 17

    Spiking Neural Network For Energy Efficient Learning And Recognition by Wong, Yan Chiew, Wang, Ning Lo

    Published 2020
    “…Nowadays, people are confronted with an increasingly large amount of data and a tremendous change of human-machine interaction modes. It is a challenging and time-consuming task for traditional computing system to deal with the content of information. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Advanced Processing of UPM-APSB’s AISA Airborne Hyperspectral Images for Individual Timber Species Identification and Mapping by Jusoff, Kamaruzaman

    Published 2007
    “…The main focus is on the development of approaches able to naturally integrate the spatial and spectral information available from the hyperspectral data. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Trace analyzer for NS-2 by Salleh A.U., Ishak Z., Din N.Md., Jamaludin M.Z.

    Published 2023
    “…Through the NS-2 Trace Analyzer the user would be able to do performance study of a network scenario through interactive GUI. This will benefit the user since he or she can concentrate on developing new algorithms or new architectures rather spending too much time on post processing of data. � 2006 IEEE.…”
    Conference paper
  20. 20

    Constant lock circuit for DC micro-grid system by Mohammed, Asaad Abduljabbar

    Published 2017
    “…For all the above, there is a need for a new interface block control to deal with these problems. For this, an algorithm system strategy for utilizing a Constant Lock Circuit in the DC micro-grid aims at maintaining a constant DC link voltage at the desired constant value of 24v to ensure high stability voltage and current without any ripple. …”
    Get full text
    Get full text
    Get full text
    Thesis