Search Results - (( development packaging methods algorithm ) OR ( java application mining algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Mining Sequential Patterns Using I-PrefixSpan by Dhany , Saputra, Rambli Dayang, R.A., Foong, Oi Mean

    Published 2007
    “…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    A web-based implementation of k-means algorithms by Lee, Quan

    Published 2022
    “…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  6. 6
  7. 7

    Development of a building energy analysis package (BEAP) and its application to the analysis of cool thermal energy storage systems by Senawi, M. Y.

    Published 2001
    “…Efficient methods of calculating custom weighting factors for load estimation using the transfer function method are also developed. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
    Get full text
    Get full text
    Thesis
  9. 9

    Path planning for unmanned aerial vehicles using visibility line-based methods by Omar, Rosli

    Published 2011
    “…This thesis concerns the development of path planning algorithms for unmanned aerial vehicles (UAVs) to avoid obstacles in two- (2D) and three-dimensional (3D) urban environments based on the visibility graph (VG) method. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Algorithm for Preprocessing Electrocardiosignal for a Wireless Holter Monitoring System by Gerasimova, Yuliya, Sidi, Fatimah, Abdullah, Lili Nurliyana, Ivel, Victor, Moldakhmetov, Sayat

    Published 2026
    “…The proposed methods and algorithms ensure high-quality, multi-day wireless transmission of ECG signals with low energy consumption.…”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Progressive damage analysis of composite layered plates using a mesh reduction method by Zahari, Rizal, El Zafrany, Ahmed

    Published 2006
    “…A progressive damage methodology and algorithm for composite laminates was successfully developed for the new finite strip methods using stress-based failure criteria. …”
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12

    Parallel algorithms for numerical simulations of EHD ion-drag micropump on distributed parallel computing systems by Shakeel Ahmed, Kamboh

    Published 2014
    “…Conventionally, the numerical simulations for such devices are obtained by using the commercial simulation packages based on the Finite Element Methods (FEM). …”
    Get full text
    Get full text
    Thesis
  13. 13

    Fitness value based evolution algorithm approach for text steganalysis model by Din, Roshidi, Samsudin, Azman, Tuan Muda, Tuan Zalizam, Lertkrai, P., Amphawan, Angela, Omar, Mohd Nizam

    Published 2013
    “…In this paper, we present a new alternative method for text steganalysis based on an evolution algorithm, implemented using the Java Evolution Algorithms Package (JEAP).The main objective of this paper is to detect the existence of hidden messages ased on fitness values of a text description.It is found that the detection performance has been influenced by two groups of fitness values which are good fitness value and bad fitness value. …”
    Get full text
    Get full text
    Article
  14. 14

    JAKIM's Halal Logo Recognition System based on Android Smartphone by Saipullah, Khairul Muzzammil

    Published 2012
    “…To banish that activity, JAKIM has released an act to standardize the Halal logo that is only awarded by JAKIM. In this paper, a method on validating Halal status for products or premise using logo identification algorithm through Smartphone is proposed. …”
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15

    Aplikasi rangkaian neural dalam pengesanan simpang bagi penterjemah lakaran pintar by Subri, Syarul Haniz

    Published 2006
    “…Back propagation neural network algorithm was used to develop and produce the classifier for corner detector algorithm. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Network reconfiguration and control for loss reduction using genetic algorithm by Jawad, Mohamed Hassan Izzaldeen

    Published 2010
    “…The proposed algorithm has been implemented in technical MATLAB package and tested with two examples namely, 18- and 49-bus systems. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Text steganalysis using evolution algorithm approach by Din, Roshidi, Tuan Muda, Tuan Zalizam, Lertkrai, Puriwat, Omar, Mohd Nizam, Amphawan, Angela, Aziz, Fakhrul Anuar

    Published 2012
    “…This study presents a new alternative of steganalysis method in order to detect hidden messages in text steganalysis called Evolution Detection Steganalysis System (EDSS) based on the evolution algorithm approach under Java Genetic Algorithms Package (JGAP). …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18

    Numerical analysis by Butcher, John

    Published 2008
    “…Selecting a numerical method, or family of methods, and integrating the method or methods into a software package, deals with all these challenges and, of necessity, seeks compromises between them. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Development of obstable avoidance system for 3D robot navigation by Er, Kai Sheng

    Published 2024
    “…In this project, an algorithm was developed to implement an obstacle avoidance system in 3D robot navigation. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  20. 20

    The use of Cox regression and genetic algorithm (CoRGA) for identifying risk factors for mortality in older people by Ahmad, Rabiah, Bath, Peter A

    Published 2004
    “…This is partly because traditional statistical methods and software packages allow a restricted number of variables and combinations of variables. …”
    Get full text
    Get full text
    Get full text
    Article