Search Results - (( java application mining algorithm ) OR ( safety implementation case algorithm ))
Search alternatives:
- safety implementation »
- implementation case »
- application mining »
- java application »
- mining algorithm »
- case algorithm »
-
1
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
2
-
3
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
Get full text
Get full text
Get full text
Article -
4
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
7
Case driven TLC model checker analysis in energy scenario
Published 2023“…Today, model checking techniques and corresponding tools are widely applied in diverse case driven scenarios, the safety critical ones in particular. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
8
Car plate recognition system : (segmentation)
Published 2005“…Therefore,the purpose of this research is to develop a prototype by referring the University College of Engineering & Technology of Malaysia (UTEC) as the case study.The use of human workforce for the safety control in UTEC really cannot be implemented consistently and effectively since human ability is limited. …”
Get full text
Get full text
Undergraduates Project Papers -
9
A safe overtaking control scheme for autonomous vehicles using rapid-exploration random tree
Published 2022“…Firstly, the kinematics and dynamic model of the vehicle are implemented. Secondly, the RRT algorithm and the A-star algorithm are expounded, and the idea of the A-star algorithm is applied to the RRT algorithm for improvement. …”
Get full text
Get full text
Get full text
Get full text
Proceedings -
10
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
Get full text
Get full text
Thesis -
11
Optimizing in-car-abandoned children’s sounds detection using deep learning algorithms / Nur Atiqah Izzati Md Fisol
Published 2023“…The optimized models have the potential to significantly reduce the number of abandoned children in cars cases, contributing to enhanced safety measures. …”
Get full text
Get full text
Student Project -
12
Flexible window-based scheduling with critical worst case latency evaluations for real time traffic in time sensitive networks
Published 2022“…The first part introduces a flexible window-overlapping scheduling (FWOS) algorithm that allows the TT windows to overlap in GCL implementations. …”
Get full text
Get full text
Thesis -
13
Modelling Autonomous Evacuation Navigation System (AENS) for optimal route using Dijkstra's algorithm
Published 2016“…Through ST adaptation, all subsystems were integrated and using the “Dijkstra’s algorithm” (DA) by modifying its function from shortest path algorithm to safest and shortest algorithm, to the nearest exit. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
14
Accident Prevention Block to Move an Automobile From Traffic Collision
Published 2019“…An effective solution needs to be implemented to help the driver in the event of losing consciousness and move the vehicle to safety, to avoid any collision with traffic. …”
Get full text
Get full text
Get full text
Article -
15
Development of low-overhead soft error mitigation technique for safety critical neural networks applications
Published 2021“…DNN-based healthcare applications are safety-critical systems that require highreliability implementation due to a high risk of human death or injury in case of malfunction. …”
Get full text
Get full text
Thesis -
16
Seat belt control system : drowsiness detector system
Published 2022“…At the end, the developed system can be implemented in older models of vehicles to decrease the rate of accidents and fatalities in Malaysia, as well improve safety of the driver.…”
Get full text
Get full text
Undergraduates Project Papers -
17
High-throughput and energy-efficient Contiki MAC layer scheme in IEEE 802.15.4 for structural health monitoring
Published 2021“…Finally, a case study of a WSN-based SHM system using developed embedded data filtering and transmission algorithms to reduce data communication is performed and taken place on a concrete beam at Civil Engineering Structure Laboratory, UPM. …”
Get full text
Get full text
Thesis -
18
A hybrid algorithm of source localization based on hyperbolic technique in WSN
Published 2014“…In this study, explicit solutions are provided by the proposed methods that are not achievable through the established methods in all cases.…”
Get full text
Get full text
Conference or Workshop Item -
19
Video surveillance: Front-yard monitoring
Published 2023“…Home intrusion is a severe crime that disrupts the safety and well-being of neighbourhoods. It has been happening at a shocking rate in recent years. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
20
Hand gesture recognition system using image processing
Published 2007“…This system also used algorithm of several processing technique that may or may not be the same output for each type of it. …”
Get full text
Get full text
Thesis
