Search Results - (( java application mining algorithm ) OR ( safety implementation case algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Mining Sequential Patterns Using I-PrefixSpan by Dhany , Saputra, Rambli Dayang, R.A., Foong, Oi Mean

    Published 2007
    “…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    A web-based implementation of k-means algorithms by Lee, Quan

    Published 2022
    “…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  6. 6
  7. 7

    Case driven TLC model checker analysis in energy scenario by Shkarupylo, Vadym, Blinov, Ihor V., Dusheba, Valentyna, Alsayaydeh, Jamil Abedalrahim Jamil

    Published 2023
    “…Today, model checking techniques and corresponding tools are widely applied in diverse case driven scenarios, the safety critical ones in particular. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    Car plate recognition system : (segmentation) by Nor Helmy Effendy, Meon

    Published 2005
    “…Therefore,the purpose of this research is to develop a prototype by referring the University College of Engineering & Technology of Malaysia (UTEC) as the case study.The use of human workforce for the safety control in UTEC really cannot be implemented consistently and effectively since human ability is limited. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  9. 9

    A safe overtaking control scheme for autonomous vehicles using rapid-exploration random tree by Yincong Ma, Kit Guan Lim, Min Keng Tan, Helen Sin Ee Chuo, Lorita Angeline, Kenneth Tze Kin Teo

    Published 2022
    “…Firstly, the kinematics and dynamic model of the vehicle are implemented. Secondly, the RRT algorithm and the A-star algorithm are expounded, and the idea of the A-star algorithm is applied to the RRT algorithm for improvement. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceedings
  10. 10

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
    Get full text
    Get full text
    Thesis
  11. 11

    Optimizing in-car-abandoned children’s sounds detection using deep learning algorithms / Nur Atiqah Izzati Md Fisol by Md Fisol, Nur Atiqah Izzati

    Published 2023
    “…The optimized models have the potential to significantly reduce the number of abandoned children in cars cases, contributing to enhanced safety measures. …”
    Get full text
    Get full text
    Student Project
  12. 12

    Flexible window-based scheduling with critical worst case latency evaluations for real time traffic in time sensitive networks by Muftah, Shalghum Khaled

    Published 2022
    “…The first part introduces a flexible window-overlapping scheduling (FWOS) algorithm that allows the TT windows to overlap in GCL implementations. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Modelling Autonomous Evacuation Navigation System (AENS) for optimal route using Dijkstra's algorithm by Abu Samah, Khyrina Airin Fariza

    Published 2016
    “…Through ST adaptation, all subsystems were integrated and using the “Dijkstra’s algorithm” (DA) by modifying its function from shortest path algorithm to safest and shortest algorithm, to the nearest exit. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    Accident Prevention Block to Move an Automobile From Traffic Collision by Rajiv, Charles Samuel

    Published 2019
    “…An effective solution needs to be implemented to help the driver in the event of losing consciousness and move the vehicle to safety, to avoid any collision with traffic. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Development of low-overhead soft error mitigation technique for safety critical neural networks applications by Khalid Adam, Ismail Hammad

    Published 2021
    “…DNN-based healthcare applications are safety-critical systems that require highreliability implementation due to a high risk of human death or injury in case of malfunction. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Seat belt control system : drowsiness detector system by Nur Aisyah, Abdul Rahman

    Published 2022
    “…At the end, the developed system can be implemented in older models of vehicles to decrease the rate of accidents and fatalities in Malaysia, as well improve safety of the driver.…”
    Get full text
    Get full text
    Undergraduates Project Papers
  17. 17

    High-throughput and energy-efficient Contiki MAC layer scheme in IEEE 802.15.4 for structural health monitoring by Al-Mekhlafi, Mohamed Abdulkarem Taher

    Published 2021
    “…Finally, a case study of a WSN-based SHM system using developed embedded data filtering and transmission algorithms to reduce data communication is performed and taken place on a concrete beam at Civil Engineering Structure Laboratory, UPM. …”
    Get full text
    Get full text
    Thesis
  18. 18

    A hybrid algorithm of source localization based on hyperbolic technique in WSN by Kabir, H., Kanesan, J., Reza, A.W., Ramiah, H.

    Published 2014
    “…In this study, explicit solutions are provided by the proposed methods that are not achievable through the established methods in all cases.…”
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19

    Video surveillance: Front-yard monitoring by Low, Bryan Keng Seong

    Published 2023
    “…Home intrusion is a severe crime that disrupts the safety and well-being of neighbourhoods. It has been happening at a shocking rate in recent years. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  20. 20

    Hand gesture recognition system using image processing

    Published 2007
    “…This system also used algorithm of several processing technique that may or may not be the same output for each type of it. …”
    Get full text
    Get full text
    Thesis