Search Results - (( java application mining algorithm ) OR ( safety implementation level algorithm ))
Search alternatives:
- safety implementation »
- implementation level »
- application mining »
- java application »
- mining algorithm »
- level algorithm »
-
1
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
2
-
3
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
Get full text
Get full text
Get full text
Article -
4
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
7
Risk assessment for safety and health algorithm for building construction in Oman
Published 2015“…By implementing definitions of safety and health on the identified extreme and high-risk levels, the key risks in this study have been classified into safety risks and health risks. …”
Get full text
Get full text
Thesis -
8
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
Get full text
Get full text
Thesis -
9
Analysis of Traffic Accident Patterns Using Association Rule Mining
Published 2024“…For example, analyzing variables at different accident levels allows policymakers to identify critical factors contributing to accidents, implement tailored safety measures, and prioritize infrastructure improvements. …”
Get full text
Get full text
Get full text
Get full text
Article -
10
Case driven TLC model checker analysis in energy scenario
Published 2023“…To foster the functional safety of corresponding program-algorithmic solutions, the model checking techniques and related tools are applied to the formal specifications of named solutions. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
11
Measuring aircraft altimetry system error using automatic dependent surveillance-broadcast data / Kalyani Bahskaran
Published 2021“…RVSM focused on reducing vertical separation minimum from 2000 feet to 1000 feet between flight level FL290 and FL410. Implementation of RVSM stresses the accuracy of aircraft avionics that report altitude and requires the Regional Monitoring Agency (RMA) to monitor the aircraft's Height Keeping Performance (HKP) to ensure the aviation safety of their airspace. …”
Get full text
Get full text
Get full text
Thesis -
12
Performance evaluation of direction of arrival (DOA) for linear array antenna design using multiple signal classification (MUSIC) algorithm in variation of displacement vectors and...
Published 2007“…In Smart Antenna system, the intelligence of the system depends on the information collected, processed and implemented through an algorithm i.e. Multiple Signal Classification (MUSIC). …”
Get full text
Get full text
Thesis -
13
Hardware software partitioning of crankshaft function in engine control units using FPGA-based testing
Published 2017“…This project proposes hardware and software co-design that provides flexibility, timing precision, performance, manageable software design, complexity and meets safety requirement. The solution is aligned with Application-Specific Integrated Circuit (ASIC), which features complex control algorithm, implementation in hardware and controllable through firmware.…”
Get full text
Get full text
Conference or Workshop Item -
14
VANET SECURITY FRAMEWORK FOR LOW LATENCY SAFETY APPLICATIONS
Published 2012“…Presently, VANET technology is surrounded with security challenges and it is essentially important for VANET to successfully implement a security measure according to the safety applications requirements. …”
Get full text
Get full text
Thesis -
15
Development of low-overhead soft error mitigation technique for safety critical neural networks applications
Published 2021“…DNN-based healthcare applications are safety-critical systems that require highreliability implementation due to a high risk of human death or injury in case of malfunction. …”
Get full text
Get full text
Thesis -
16
-
17
Seat belt control system : drowsiness detector system
Published 2022“…At the end, the developed system can be implemented in older models of vehicles to decrease the rate of accidents and fatalities in Malaysia, as well improve safety of the driver.…”
Get full text
Get full text
Undergraduates Project Papers -
18
Securing Data Using Deep Hiding Selected The Least Significant Bit And Adaptive Swarm Algorithm
Published 2024journal::journal article -
19
High-throughput and energy-efficient Contiki MAC layer scheme in IEEE 802.15.4 for structural health monitoring
Published 2021“…L-TDMA shows a remarkable ability to conserve power in comparison to other protocols in different operating systems. Finally, the implementation of the developed embedded algorithms for strain-based applications resulted in a power consumption reduction of 77% compared to centralized processing.…”
Get full text
Get full text
Thesis -
20
