Search Results - (( java application mining algorithm ) OR ( changes detection path algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3

    A Collision Detection Algorithm For Virtual Robot-Centered Flexible Manufacturing Cell by Arshad, Haslina

    Published 2008
    “…The results showed that the collision detection algorithm can be used to support the concept of hardware reconfigurablility of FMC which can be achieved by changing, removing, recombining or rearranging its manufacturing elements in order to meet new demands such as introduction of new product or change.…”
    Get full text
    Get full text
    Thesis
  4. 4

    Collision avoidance algorithm design for UAV base on parametric theorem and circle overlapping method / Nur Fadzilah Mohamad Radzi by Nur Fadzilah, Mohamad Radzi

    Published 2013
    “…Then, a collision detection algorithm is developed to calculate the potential of collision in future. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6
  7. 7
  8. 8

    Mining Sequential Patterns Using I-PrefixSpan by Dhany , Saputra, Rambli Dayang, R.A., Foong, Oi Mean

    Published 2007
    “…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    A web-based implementation of k-means algorithms by Lee, Quan

    Published 2022
    “…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  10. 10
  11. 11
  12. 12

    Adaptable decentralized orchestration engine for block structured non-transactional workflow in service oriented architecture. by Esfahani, Faramarz Safi

    Published 2011
    “…The first aspect is frequent-path adaptability, which is equal to detecting closely-interrelated activities and encapsulating them in the same fragment. …”
    Get full text
    Get full text
    Thesis
  13. 13

    IMPLEMENTATION OF BEHAVIOUR BASED NAVIGATION IN A PHYSICALLY CONFINED SITE by ABDUL RAZAK, NUSRAH

    Published 2017
    “…When the environment is changed the algorithm may fail to adapt itself to the new configuration. …”
    Get full text
    Get full text
    Final Year Project
  14. 14

    The shortest route of the potential companies for internship using Dijkstra’s Algorithm / Mohamad Khairul Ikhwan Mohd Radzi by Mohd Radzi, Mohamad Khairul Ikhwan

    Published 2017
    “…However, for optimum distance, dijkstra algorithm has been used. This algorithm is one of the algorithms used for getting the lowest cost search path. …”
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16

    HTS : a hierarchical method for load balancing in autonomous networks. by Ahmad Zukarnain, Zuriati, Udzir, Nur Izura, Othman, Mohamed

    Published 2008
    “…In this paper, the authors are proposed HTS; a BGP-based hierarchical network traffic reconfiguration method to redistribute traffic on overloaded link for IP-based network. Proposed algorithm fulfills at two steps. Firstly overload detection function through an explorer algorithm to construct overloaded link table due to disruption link. …”
    Get full text
    Get full text
    Article
  17. 17

    Wi-Fi signal strengths database construction for indoor positioning systems using Wi-Fi RFID by Narzullaev, Anvar, Selamat, Mohd Hasan

    Published 2013
    “…Whenever there are significant changes in signal levels detected, server will initiate database reconstruction procedure. …”
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
    Get full text
    Get full text
    Thesis
  19. 19

    Safe avoidance region detection for unmanned aerial vehicle using cues from expansion of feature points by Ramli, Muhammad Faiz, Sutjipto, Agus G.E., Sulaeman, Erwin, Ari Legowo, Ari Legowo

    Published 2024
    “…A robust system should be able to not only detect obstacles but the free region for the avoidance path as well. …”
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20

    A hybrid rate control mechanism for forwarding and congestion control in named data network by Alsamman, Mohammed Gamal

    Published 2020
    “…Therefore, transport algorithms which use conventional paradigms would not work correctly in the NDN environment, since the content source location frequently changes. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis