Search Results - (( java application sensor algorithm ) OR ( knowledge detection using algorithm ))
Search alternatives:
- knowledge detection »
- application sensor »
- java application »
- sensor algorithm »
- using algorithm »
-
1
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…The process begins through the monitoring of plants using sensors connected to the Arduino device. Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. …”
Get full text
Get full text
Get full text
Article -
2
Design Of Robot Motion Planning Algorithm For Wall Following Robot
Published 2006Get full text
Get full text
Monograph -
3
Improving intrusion detection using genetic algorithm
Published 2013“…The validity of this approach is verified using Knowledge Discovery and Data Mining Cup 1999 (KDD Cup ’99) dataset. …”
Get full text
Get full text
Get full text
Article -
4
Hyper-heuristic approaches for data stream-based iIntrusion detection in the Internet of Things
Published 2022“…The system trains the NN on previously labelled data, and its knowledge is used to calculate the core online-offline clustering block error. …”
Get full text
Get full text
Thesis -
5
An Innovative Signal Detection Algorithm in Facilitating the Cognitive Radio Functionality for Wireless Regional Area Network Using Singular Value Decomposition
Published 2011“…In order to use the algorithm effectively, users need to balance between detection accuracy and execution time. …”
Get full text
Get full text
Get full text
Thesis -
6
Facial Drowsiness Signs Detection Algorithm Using Image Processing Techniques For Various Lighting Condition
Published 2017“…In this project, the algorithm is developed based on four main algorithms which are the detection algorithm, the tracking algorithm, the preprocessing algorithm and the drowsiness signs analysis algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
Image Based Congestion Detection Algorithms And Its Real Time Implementation
Published 2015“…The methodology includes vehicle detection by using backlight pairing feature algorithm and modified Watershed algorithm. …”
Get full text
Get full text
Thesis -
8
Evaluation of fall detection classification approaches
Published 2012“…This paper presents the comparison of different machine learning classification algorithms using Waikato Environment for Knowledge Analysis (WEKA) platform for classifying falling patterns from ADL patterns. …”
Get full text
Get full text
Conference or Workshop Item -
9
Human activity recognition via accelerometer and gyro sensors
Published 2023“…To implement the data engineering system proposed, two mobile applications, SensorData and SensorDataLogger with user-friendly interfaces and intuitive functionalities are developed using Java programming language and Android Studio. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
10
Unsupervised Anomaly Detection with Unlabeled Data Using Clustering
Published 2005Get full text
Get full text
Conference or Workshop Item -
11
-
12
An evaluation on KNN-SVM algorithm for detection and prediction of DDoS attack
Published 2016Get full text
Get full text
Get full text
Book Section -
13
Comparison on machine learning algorithm to fast detection of malicious web pages
Published 2021“…The WEKA (Waikato Environment for Knowledge Analysis) will be used for testing and generating the comparison output. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
14
Feature selection algorithms for Malaysian dengue outbreak detection model
Published 2017“…Dengue fever is considered as one of the most common mosquito borne diseases worldwide. Dengue outbreak detection can be very useful in terms of practical efforts to overcome the rapid spread of the disease by providing the knowledge to predict the next outbreak occurrence. …”
Get full text
Get full text
Get full text
Article -
15
Fuzzy modelling using firefly algorithm for phishing detection
Published 2019“…One of the suitable methods provides the Firefly Algorithm (FA). FA is a nature-inspired algorithm that uses fireflies’ behavior to interpret data. …”
Get full text
Get full text
Get full text
Article -
16
Integrated combined layer algorithm of jamming detection and classification in manet / Ahmad Yusri Dak
Published 2019“…Thus, this study proposes the development of algorithms to detect and classify jamming attacks using a set of parameters on the physical layer and MAC in MANET. …”
Get full text
Get full text
Thesis -
17
An enhanced classification framework for intrusions detection system using intelligent exoplanet atmospheric retrieval algorithm
Published 2022“…Currently, many companies use data mining for various implementations. One form of implementation is intrusion detection system (IDS). …”
Get full text
Get full text
Get full text
Article -
18
Early detection of dengue disease using extreme learning machine
Published 2018Get full text
Get full text
Article -
19
Research on the construction of an efficient and lightweight online detection method for tiny surface defects through model compression and knowledge distillation
Published 2024“…Channel pruning and layer pruning are applied to the sparse model, and post-processing methods using knowledge distillation are used to effectively reduce the model size and forward inference time while maintaining model accuracy. …”
Get full text
Get full text
Article -
20
Improved Malware detection model with Apriori Association rule and particle swarm optimization
Published 2019“…In this method, the candidate detectors generated by particle swarm optimization form rules using apriori association rule. These rule models are used together with extraction algorithm to classify and detect malicious android application. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article
