Search Results - (( java application mining algorithm ) OR ( data implementation force algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Mining Sequential Patterns Using I-PrefixSpan by Dhany , Saputra, Rambli Dayang, R.A., Foong, Oi Mean

    Published 2007
    “…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    A web-based implementation of k-means algorithms by Lee, Quan

    Published 2022
    “…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  6. 6
  7. 7

    Software User Interface and Algorithm Development for Signal and Noise Characterization by Phoong, Wei Siang

    Published 2015
    “…The output data display in array is implement to display in two dimension array with X-axis direction and Yaxis direction.…”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  8. 8
  9. 9

    Real time self-calibration algorithm of pressure sensor for robotic hand glove system by Almassri, Ahmed M. M.

    Published 2019
    “…The model was tested using an untrained input data set in order to verify the Proposed model’s capability for implementing a self-calibration algorithm. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
    Get full text
    Get full text
    Thesis
  11. 11

    Development of a robotic hand glove system for secure grasp with AI wireless sensor data by Almassri, Ahmed, Koyanagi, Ken'ichi, Wada, Chikamune, Horio, Keiichi, Wan Hasan, Wan Zuha

    Published 2023
    “…It is composed of five low-cost force sensors attached to the glove’s fingertips and wireless data logger. …”
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12

    Features selection for IDS in encrypted traffic using genetic algorithm by Barati, Mehdi, Abdullah, Azizol, Mahmod, Ramlan, Mustapha, Norwati, Udzir, Nur Izura

    Published 2013
    “…This paper presents a hybrid feature selection using Genetic Algorithm and Bayesian Network to improve Brute Force attack detection in Secure Shell (SSH) traffic.Brute Force attack traffic collected in a client-server model is implemented in proposed method.Our results prove that the most efficient features were selected by proposed method.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13
  14. 14

    Features selection for ids in encrypted traffic using genetic algorithm by Barati, Mehdi, Abdullah, Azizol, Mahmod, Ramlan, Mustapha, Norwati, Udzir, Nur Izura

    Published 2013
    “…Brute Force attack traffic collected in a client-server model is implemented in proposed method. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15
  16. 16

    SENSORY EXPERT: DEVICE FOR SENSORY TEST by MOHD ADZMI, MOHD DANIAL AIMAN

    Published 2018
    “…The data is then sent to a Gmail as a storage by developing algorithm in Wi-Fi module NodeMCU ESP8266. …”
    Get full text
    Get full text
    Final Year Project
  17. 17

    Efficient and secured compression and steganography technique in wireless sensor network by Tuama, Ammar Yaseen

    Published 2016
    “…First, the new data compression algorithm is proposed for compressing sensed data before it gets transmitted to the sink. …”
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    Digital closed loop controller of hydraulic cylinder using linear transducer / Mohd. Aizuddin Khalid by Khalid, Mohd. Aizuddin

    Published 2010
    “…The personal computer is for generating the outputs/inputs signals, from MATLAB/SIMULINK software package, to the data acquisition board. SIMULINK is integrated with MATLAB, providing immediate access to an extensive range of tools that can develop algorithms, analyze and visualize simulations, customize the modeling environment, define signal, parameter, and test data. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Financial time series predicting using machine learning algorithms by Tiong, Leslie Ching Ow *

    Published 2013
    “…Subsequently, Dynamic Time Warping (DTW) algorithm is utilised through brute force to predict the trend movement. …”
    Get full text
    Thesis
  20. 20

    Key schedule algorithm based on coordinate geometry of a three-dimensional hybrid cube by Mushtaq, Muhammad Faheem

    Published 2019
    “…Cryptographic algorithms play an important role in information security where it ensures the security of data across the network or storage. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis