Search Results - (( frames classification modeling algorithm ) OR ( java application mining algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    ANALYSIS OF CLASSIFICATION PROCESS FOR VIDEO SCENE UNDERSTANDING by MOHD RASHDAN, NURUL FARAH

    Published 2019
    “…Scene understanding is a process observing scenes which humans are used as models to understand them. This project is focused on analyzing the classification process for video scene. …”
    Get full text
    Get full text
    Final Year Project
  5. 5

    A fuzzy approach for early human action detection / Ekta Vats by Ekta, Vats

    Published 2016
    “…In order to perform early human action detection, the conventional classification problem is modified into frame-by-frame level classification. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Mining Sequential Patterns Using I-PrefixSpan by Dhany , Saputra, Rambli Dayang, R.A., Foong, Oi Mean

    Published 2007
    “…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    A web-based implementation of k-means algorithms by Lee, Quan

    Published 2022
    “…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  8. 8

    Enhanced emotion recognition in videos: a convolutional neural network strategy for human facial expression detection and classification by Ashraf, Arselan, Gunawan, Teddy Surya, Arifin, Fatchul, Kartiwi, Mira, Sophian, Ali, Habaebi, Mohamed Hadi

    Published 2023
    “…To address these issues, we propose a comprehensive CNN-based model for real-time detection and classification of five primary emotions: anger, happiness, neutrality, sadness, and surprise. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  9. 9
  10. 10

    CNN architectures for road surface wetness classification from acoustic signals by Bahrami, Siavash, Doraisamy, Shyamala, Azman, Azreen, Nasharuddin, Nurul Amelina, Yue, Shigang

    “…Recorded acoustic signals were segmented into equal frames and thirteen MFCCs were extracted for each frame to train the CNNs. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Autism spectrum self-stimulatory behaviours classification using explainable temporal coherency deep networks and SVM classifier / Liang Shuaibing by Liang , Shuaibing

    Published 2022
    “…Meanwhile, it is often difficult to obtain good classification results using unlabelled data, further research to train a model that can obtain good classification results and at the same time being practical will be valuable. …”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    Adaptive Non-Stationary Cardiac Signals Identification using an Augmented MLP Network by Asirvadam , Vijanth Sagayan, McLoone, Sean

    Published 2007
    “…In this paper hybrid form recursive training algorithms, which combines both linear and nonlinear orientation of weights, is being used to model or identify ElectroCardioGraphy (ECG) signals. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
    Get full text
    Get full text
    Thesis
  14. 14

    A comparative study and simulation of object tracking algorithms by Ji, Yuanfa, Yin, Pan, Sun, Xiyan, Kamarul Hawari, Ghazali, Guo, Ning

    Published 2020
    “…This article introduces the popular object tracking algorithms, from common problems in object tracking to the classification of algorithms: Early classic trackingalgorithms, tracking algorithms based on kernel correlation filtering, and tracking algorithms based on deep learning. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15
  16. 16

    Plant disease detection using deep learning by Cheng, Jung Yin

    Published 2024
    “…However, when deploying these trained models on a central processing unit (CPU), YOLOv8 models consistently outperform ViT algorithms in terms of speed and accuracy. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  17. 17

    Enhanced mechanism to handle missing data of Hadith classifier by Aldhlan, Kawther A., Zeki, Ahmed M., Zeki, Akram M.

    Published 2011
    “…This research produced a mechanism to deal with missing data in Hadith database, 999 Hadiths from Sahih Al-Bukhari, Jami'u Al-Termithi and Selseelt AlaHadith Aldae'ifah w' Almadu'h were framed the sample of this study, the attributes of the hadith database were gained according to the validate methods of Hadith science, the experiment applied C4.5 algorithm to extract the rules of classification. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  18. 18
  19. 19

    Diagnosis security problems in cloud computing for business cloud by Shakir M., Abubakar A.B., Yousoff Y.B., Sagher A.M., Alkayali H.

    Published 2023
    “…The findings of this study, firstly the organizations or institutions are very concerned in improving the security of cloud computing through the application of the authority model and dynamic classification of data model based on the multi-level security. …”
    Article
  20. 20