Search Results - (( java application mining algorithm ) OR ( mobile extraction method algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Mining Sequential Patterns Using I-PrefixSpan by Dhany , Saputra, Rambli Dayang, R.A., Foong, Oi Mean

    Published 2007
    “…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    A web-based implementation of k-means algorithms by Lee, Quan

    Published 2022
    “…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  6. 6

    Data mining in mobile ECG based biometric identification by Sidek, Khairul Azami, Mai, Vu, Khalil, Ibrahim

    Published 2014
    “…Subjects in MIT-BIH Normal Sinus Rhythm Database (NSRDB) were used to validate the reliability and stability of the subject recognition methods. Discriminatory features extracted from the experimentation were later applied to different classifiers for performance measures based on the complexity of our proposed sample extraction method when compared to other related algorithms, the total execution time (TET) applied on different classifiers in various mobile devices and the classification accuracies when applied to various classification techniques. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Extracting crown morphology with a low-cost mobile LiDAR scanning system in the natural environment by Wang, Kai, Zhou, Jun, Zhang, Wenhai, Zhang, Baohua

    Published 2021
    “…Finally, morphological parameters of the canopy, such as crown height, crown diameter, and crown volume, are extracted using statistical and voxel methods. To verify the algorithm, a total of 43 trees in multiple plots of the campus were tested and compared. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Overhead vision system for mobile robot orientation detection by Fadzilah, Hashim

    Published 2011
    “…Cameras are used to capture the images of mobile robot at various orientations. The images are preprocessed and important features are extracted to be used in the proposed methods. …”
    Get full text
    Thesis
  9. 9
  10. 10
  11. 11

    A malware analysis and detection system for mobile devices / Ali Feizollah by Ali, Feizollah

    Published 2017
    “…Power consumption is one major constraint that makes traditional detection methods impractical for mobile devices, while cloud-based techniques raise many privacy concerns. …”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    Reduced Set Kernel Principal Component Analysis (Rskpca) Algorithm for Palm Print Based Mobile Biometric System by Ibrahim, Noor Salwani

    Published 2015
    “…In this project, it has been proven that the proposed RSKPCA as feature extraction gives the best result for mobile biometric system based on palm print. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Designing an expressive virtual Kompang on mobile device with tri-axial accelerometer by Leng, Hoo Yong, Mohd Norowi, Noris, Jantan, Azrul Hazri

    Published 2018
    “…This paper is therefore implemented a simple extraction method by extracting percussive features from embedded sensors to map with the output sound with minimum delay. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
    Get full text
    Get full text
    Thesis
  15. 15

    Color Image Segmentation Based on Bayesian Theorem for Mobile Robot Navigation by Rahimizadeh, Hamid

    Published 2009
    “…In order to show the real time ability and robustness of proposed method for color segmentation, experimental results conducted on vision based mobile robot for navigation. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Optimising acoustic features for source mobile device identification using spectral analysis techniques / Mehdi Jahanirad by Mehdi , Jahanirad

    Published 2016
    “…Hence, addressing robust feature extraction methods for source communication device identification is necessary. …”
    Get full text
    Get full text
    Thesis
  17. 17

    The classification of wink-based eeg signals by means of transfer learning models by Jothi Letchumy, Mahendra Kumar

    Published 2021
    “…This study aimed to explore the performance of different pre-processing methods, namely Fast Fourier Transform, Short-Time Fourier Transform, Discrete Wavelet Transform, and Continuous Wavelet Transform (CWT) that could allow TL models to extract features from the images generated and classify through selected classical ML algorithms . …”
    Get full text
    Get full text
    Thesis
  18. 18

    EEG-Based Brain-Machine Interface (BMI) for Controlling Mobile Robots: The Trend of Prior Studies by Murali Krishnan, Muralindran Mariappan

    Published 2015
    “…In this paper, we review the background, feature extraction and classification algorithms used to design the Electroencephalography (EEG) based Brain-Machine Interface (BMI) to control the mobile robots.…”
    Get full text
    Get full text
    Article
  19. 19
  20. 20

    Analytical method for forensic investigation of social networking applications on smartphones by Dezfouli, Farhood Norouzizadeh

    Published 2016
    “…Therefore, the result of previous researches indicate that the current mobile forensic analyzer tools and methods are not able to automatically acquire enough valuable data remnants from social networking applications on smartphones and only provide an interface to the data for the investigator. …”
    Get full text
    Get full text
    Get full text
    Thesis