Search Results - (( frames constructing _ algorithm ) OR ( java application mining algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Mining Sequential Patterns Using I-PrefixSpan by Dhany , Saputra, Rambli Dayang, R.A., Foong, Oi Mean

    Published 2007
    “…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    A web-based implementation of k-means algorithms by Lee, Quan

    Published 2022
    “…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  6. 6
  7. 7

    Development of obstable avoidance system for 3D robot navigation by Er, Kai Sheng

    Published 2024
    “…To prepare for obstacle avoidance algorithm development, a differential drive robot was constructed, and a URDF description was prepared to ensure correct odometry data conversion from sensor coordinate frames to the robot coordinate frame. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  8. 8

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
    Get full text
    Get full text
    Thesis
  9. 9

    802.11 MAC layer sniffer using spoof detection algorithm / Azwan Abdul Satar by Abdul Satar, Azwan

    Published 2007
    “…The result of these tests showed that the wireless sniffer was able to identify all normal gap, spoofing, high gap between successive frames, out of order and retransmit frames. Furthermore, at the end of its execution, the sniffer provide simple network statistic allowing user to detect abnormal fraffic such as high gap between successive frames sequence number or high percentage of retransmitted frames send by a source. …”
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11

    Development of finite element model for soil-structure interaction by Shoaei, Mohammad Dalili

    Published 2014
    “…Nonlinear interactive analysis of an asymmetric frame in the current study showed 26% increase in the required volume of reinforced concrete for construction of the frame. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Two-dimensional burst construction with QoS assurance for OFDMA mobile WiMAX system by Alsahag, Ali Mohammed Mansoor, Mohd Ali, Borhanuddin, Noordin, Nor Kamariah, Mohamad, Hafizal, Ramli, Nordin

    Published 2014
    “…Simulation results show that the burst construction mechanism result is competitive.…”
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    Development of a scalable video compression algorithm by Khalifa, Othman Omran, Issa, Sinzobakwira, Olanweraju, Rashidah Funke, Al Khazmi, El Mahdi A

    Published 2012
    “…To improve the perceptual quality of coded video in a computation-constrained scenario, through controlling per-frame complexity, a rate-distortion optimised (RDO) rate control algorithm for encoding low bit rate video helped to achieve the target bitrates and PSNR using Lagrangian multiplier function. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  14. 14

    Semantic shot classification in soccer videos via playfield ratio and object size considerations. by Abdul Halin, Alfian, Mohd Sharef, Nurfadhlina, Jantan, Azrul Hazri

    Published 2013
    “…Class labels are then accordingly assigned to each frame based on carefully constructed rule-sets. Majority voting is finally performed where the dominant frame labels within each shot is used as the ultimate class label. …”
    Get full text
    Get full text
    Article
  15. 15
  16. 16

    Block Matching Algorithm (BMA) of the Hybrid Adaptive Rood Pattern Search (ARPS) Based on Its Motion Speed by Faizul Hadi Jamil, Ali Chekima, Wong Hock Tze @ Farrah Wong, Rosalyn R Porle, Razak Ali Lee, Ismail Saad

    Published 2017
    “…The experimental result shows that by using the hybrid BMA technique, it can produce a better quality of the constructed frame and also it achieve less computational complexity at the same time.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    A fuzzy approach for early human action detection / Ekta Vats by Ekta, Vats

    Published 2016
    “…The novelty lies in the construction of a frame-by-frame membership function for each kind of possible movement, taking into account several human actions from a publicly available dataset. …”
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19

    Real-time shadow casting using fake soft shadow volume with stencil buffer by Lee, Kong Weng

    Published 2006
    “…Results from various tests reveal that the proposed algorithm not only achieves better frame per second performance but also maintains the quality of soft shadows. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Building a feature-space for visual surveillance by Altahir, A.A., Asirvadam, V.S.

    Published 2014
    “…The future of visual surveillance applications relies on the developments in the area of computer vision, human motion analysis and computer algorithms. This paper considers objects low level feature selection and extraction from video frames in order to construct a feature space for visual surveillance applications. …”
    Get full text
    Get full text
    Conference or Workshop Item