Search Results - (( java applications sensor algorithm ) OR ( knowledge detection method algorithm ))
Search alternatives:
- applications sensor »
- knowledge detection »
- java applications »
- sensor algorithm »
- method algorithm »
-
1
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…The process begins through the monitoring of plants using sensors connected to the Arduino device. Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. …”
Get full text
Get full text
Get full text
Article -
2
-
3
Research on the construction of an efficient and lightweight online detection method for tiny surface defects through model compression and knowledge distillation
Published 2024“…In response to the current issues of poor real-time performance, high computational costs, and excessive memory usage of object detection algorithms based on deep convolutional neural networks in embedded devices, a method for improving deep convolutional neural networks based on model compression and knowledge distillation is proposed. …”
Get full text
Get full text
Article -
4
Hybrid Neural Networks and Genetic Algorithm for Fault Detection and Diagnosis of a Plant
Published 2008“…The proposed fault diagnosis method combines ANNs, GAs and classical probability with an expert knowledge base. …”
Get full text
Get full text
Conference or Workshop Item -
5
Image Based Congestion Detection Algorithms And Its Real Time Implementation
Published 2015“…The proposed system uses a fast and reliable method to detect traffic congestions. The methodology includes vehicle detection by using backlight pairing feature algorithm and modified Watershed algorithm. …”
Get full text
Get full text
Thesis -
6
Design Of Robot Motion Planning Algorithm For Wall Following Robot
Published 2006Get full text
Get full text
Monograph -
7
Comparison on machine learning algorithm to fast detection of malicious web pages
Published 2021“…Furthermore, previous approached have used blacklist technique which a conventional method and have shown promising result in detecting malicious webpages. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
8
Fuzzy modelling using firefly algorithm for phishing detection
Published 2019“…To generate the fuzzy parameters automatically, an optimization method is needed. One of the suitable methods provides the Firefly Algorithm (FA). …”
Get full text
Get full text
Get full text
Article -
9
Unsupervised Anomaly Detection with Unlabeled Data Using Clustering
Published 2005“…We present a clustering-based intrusion detection algorithm, unsupervised anomaly detection, which trains on unlabeled data in order to detect new intrusions. …”
Get full text
Get full text
Conference or Workshop Item -
10
Integrated combined layer algorithm of jamming detection and classification in manet / Ahmad Yusri Dak
Published 2019“…This creates the jamming detection and classification parameters. The second stage is detecting jammers by integrating both lower layers by developing Integrated Combined Layer Algorithm (ICLA). …”
Get full text
Get full text
Thesis -
11
Twisted pair cable fault diagnosis via random forest machine learning
Published 2022“…Currently, most of the telecommunication providers monitor the network performance degradation hence troubleshoot the present of the fault by using commercial test gear on-site, which may be resolved using data analytics and machine learning algorithm. This paper presents a fault diagnosis method for twisted pair cable fault detection based on knowledge-based and data-driven machine learning methods. …”
Get full text
Get full text
Get full text
Article -
12
A Systematic Review of Anomaly Detection within High Dimensional and Multivariate Data
Published 2023“…Moreover, a comparison of each algorithm for anomaly detection is also provided to produce a better algorithm. …”
Get full text
Get full text
Article -
13
A Systematic Review of Anomaly Detection within High Dimensional and Multivariate Data
“…Moreover, a comparison of each algorithm for anomaly detection is also provided to produce a better algorithm. …”
Get full text
Get full text
Article -
14
A Systematic Review of Anomaly Detection within High Dimensional and Multivariate Data
Published 2023“…Moreover, a comparison of each algorithm for anomaly detection is also provided to produce a better algorithm. …”
Get full text
Get full text
Article -
15
A Systematic Review of Anomaly Detection within High Dimensional and Multivariate Data
Published 2023“…Moreover, a comparison of each algorithm for anomaly detection is also provided to produce a better algorithm. …”
Get full text
Get full text
Article -
16
A Systematic Review of Anomaly Detection within High Dimensional and Multivariate Data
Published 2023“…Moreover, a comparison of each algorithm for anomaly detection is also provided to produce a better algorithm. …”
Get full text
Get full text
Article -
17
A Systematic Review of Anomaly Detection within High Dimensional and Multivariate Data
Published 2023“…Moreover, a comparison of each algorithm for anomaly detection is also provided to produce a better algorithm. …”
Get full text
Get full text
Article -
18
A Systematic Review of Anomaly Detection within High Dimensional and Multivariate Data
Published 2023“…Moreover, a comparison of each algorithm for anomaly detection is also provided to produce a better algorithm. …”
Get full text
Get full text
Article -
19
Dissimilarity algorithm on conceptual graphs to mine text outliers
Published 2009“…In Comparison to other text outlier detection method, this approach managed to capture the semantics of documents through the use of CGs and is convenient to detect outliers through a simple dissimilarity function.Furthermore, our proposed algorithm retains a linear complexity with the increasing number of CGs.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
20
An evaluation on KNN-SVM algorithm for detection and prediction of DDoS attack
Published 2016Get full text
Get full text
Get full text
Book Section
