Search Results - (( developing interactive prevention algorithm ) OR ( java application mining algorithm ))

  • Showing 1 - 17 results of 17
Refine Results
  1. 1
  2. 2
  3. 3

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Mining Sequential Patterns Using I-PrefixSpan by Dhany , Saputra, Rambli Dayang, R.A., Foong, Oi Mean

    Published 2007
    “…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    A web-based implementation of k-means algorithms by Lee, Quan

    Published 2022
    “…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  6. 6
  7. 7

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
    Get full text
    Get full text
    Thesis
  8. 8

    Development of an effective clustering algorithm for older fallers by Goh, Choon Hian, Wong, Kam Kang, Tan, Maw Pin *, Ng, Siew Cheok, Chuah, Yea Dat, Kwan, Ban Hoe

    Published 2022
    “…The purpose of this study was, therefore, to develop a clustering-based algorithm to determine falls risk. …”
    Get full text
    Get full text
    Article
  9. 9

    Development of efficient t-way test data generation algorithm and execution strategies by Khandakar Fazley, Rabbi

    Published 2012
    “…R2Way outperforms other existing strategies but cannot support higher interaction level (T > 2). And finally, (IV) MTTG (Multi-Tuple based T-way Test Data Generation) strategy is developed inspiring kids “Card Game” to overcome the limitations of interaction strength. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Accident Prevention Block to Move an Automobile From Traffic Collision by Rajiv, Charles Samuel

    Published 2019
    “…In the present work, an attempt has been made to propose an accident prevention block in automobiles that can sense the tired/sleepy driver via a camera and algorithms, to maneuver the vehicle to safety. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    All-in-1 adverse drug reaction reporting system / Long Chiau Ming … [et al.] by Chiau Ming, Long, Karuppannan, Mahmathi, Abdul Wahab, Izyan, Abd Wahab, Mohd Shahezwan, Zulkifly, Hanis Hanum

    Published 2014
    “…In a later stage of this project, we could quantify the risk factors for ADR and drug interaction and develop a predictive model which links drug interaction with ADR.…”
    Get full text
    Get full text
    Get full text
    Book Section
  12. 12

    Crowd behavior monitoring using self-adaptive social force model by Wan Nur Azhani, W. Samsudin, Kamarul Hawari, Ghazali

    Published 2019
    “…This work aims to develop a crowd behavior monitoring system using Self-Adaptive SFM. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  13. 13
  14. 14

    3D Face Analysis using Tensor Approach by Suriani, Ab Rahman

    Published 2022
    “…Early studies in face research used matrix-based and vector-based algorithms to represent faces. According to studies, these methods have the potential to prevent the loss of critical and significant data, which could lead to lower recognition performance. …”
    Get full text
    Get full text
    Thesis
  15. 15

    A conceptual anonymity model to ensure privacy for sensitive network data by Arafat, N.H.M., Pramanik, Md Ileas, Abu Jafar, Md Muzahid, Lu, Bibo, Jahan, Sumaiya, Murad, Saydul Akbar

    Published 2021
    “…The growing popularity of this industry, as well as the required development of data sharing tools and technology, pose major threats to an individual's sensitive information privacy. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    Monitoring cathodic protection system for underground pipeline by Thai, Seng Choong

    Published 2013
    “…In this research, a software algorithm is created to be able to sense the readings of drain point, shunt current, transformer rectifier voltage, temperature, humidity and to response to multiple levels of CP malfunctions using interactive graphical method and mapping system. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Depression Detection in Tweets from Urban Cities of Malaysia using Deep Learning by Priya Sri, E.K., Savita, K.S., Zaffar, M.

    Published 2021
    “…Therefore, the research entails on how the problem statement of this project on developing an algorithm that can predict text- based depression symptoms using deep learning and Natural Language Processing (NLP) can be achieved. …”
    Get full text
    Get full text
    Conference or Workshop Item