Search Results - (( java implementation tree algorithm ) OR ( changes activation detection algorithm ))

Refine Results
  1. 1

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Amplitude independent versus amplitude dependent muscle activity detection algorithms: a comparative study by Khalid Hameed, Husamuldeen, Wan Hasan, Wan Zuha, Shafie, Suhaidi, Ahmad, Siti Anom, Jaafar, Haslina

    Published 2020
    “…Moreover, the sEMG signal amplitude is not constant during the recording time due to the variation in the characteristics of the electrode-skin interface and due to the changes in the ground reference level. Therefore, the performance of the muscle activity detection algorithms should not be affected by the involuntary amplitude variations of the sEMG signal in order to achieve reliable control of robotic devices intended for disabled people.To accentuate the importance of the amplitude independent muscle activity detection methods over the amplitude dependent detection methods, a comparative study has been conducted in this paper between the performance of an amplitude independent muscle activity detection algorithm (FLA-MSE algorithm) and three amplitude dependent algorithms with respect to the detection capability of weak muscle activities and with respect to the immunity against false alarms. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde by Ogunfolajin Maruff , Tunde

    Published 2022
    “…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    Detection of muscle activities in the sEMG signal by using frequency features and adaptive decision threshold by Hameed, Husamuldeen Khalid, Wan Hasan, Wan Zuha, Shafie, Suhaidi, Ahmad, Siti Anom, Jaafar, Haslina, Inche Mat, Liyana Najwa

    Published 2020
    “…In this paper, an amplitude-independent algorithm had been developed with an adaptive decision threshold; the algorithm employed only frequency features of the sEMG signal to detect muscle activities. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Detection of muscle activities in the sEMG signal by using frequency features and adaptive decision threshold by Hameed, Husamuldeen Khalid, Wan Hasan, Wan Zuha, Shafie, Suhaidi, Ahmad, Siti Anom, Jaafar, Haslina, Inche Mat, Liyana Najwa

    Published 2020
    “…In this paper, an amplitude-independent algorithm had been developed with an adaptive decision threshold; the algorithm employed only frequency features of the sEMG signal to detect muscle activities. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization by Mohammad Ata, Karimeh Ibrahim

    Published 2019
    “…This study proposes a car parking management system which applies Dijkstra’s algorithm, Ant Colony Optimization (ACO) and Binary Search Tree (BST) in structuring a guidance system for indoor parking. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Collision avoidance algorithm design for UAV base on parametric theorem and circle overlapping method / Nur Fadzilah Mohamad Radzi by Nur Fadzilah, Mohamad Radzi

    Published 2013
    “…Finally, the collision avoidance algorithm is verified through MATLAB software. Various cases are tested to demonstrate the robustness of both collision detection and avoidance algorithms.…”
    Get full text
    Get full text
    Thesis
  8. 8

    Image authentication using Scale Invariant Feature Transform (SIFT) / Nurul Anis Suriana Adnan by Adnan, Nurul Anis Suriana

    Published 2017
    “…It is difficult to identify the authenticity of the image since they left no trace for such changes in the image. Forgery detection techniques are divided into two approaches; active and passive. …”
    Get full text
    Get full text
    Thesis
  9. 9

    The effect of replacement strategies of genetic algorithm in regression test case prioritization of selected test cases by Musa, Samaila, Md Sultan, Abu Bakar, Abd Ghani, Abdul Azim, Baharom, Salmi

    Published 2015
    “…Regression testing is one of the software maintenance activities that is time consuming and expensive. Design-based regression testing approaches have been proposed to address changes at higher levels of abstraction, these approaches may not detect changes in the method body and several of the code based addresses procedural programs. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Hybrid intelligent approach for network intrusion detection by Al-Mohammed, Wael Hasan Ali

    Published 2015
    “…Hence, there must be substantial improvement in network intrusion detection techniques and systems. Due to the prevailing limitations of finding novel attacks, high false detection, and accuracy in previous intrusion detection approaches, this study has proposed a hybrid intelligent approach for network intrusion detection based on k-means clustering algorithm and support vector machine classification algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    Intrusion Detection in Mobile Ad Hoc Networks Using Transductive Machine Learning Techniques by Farhan, Farhan Abdel-Fattah Ahmad

    Published 2011
    “…The transductive conformal prediction and outlier detection have been employed for feature selection algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    Driver drowsiness detection using different classification algorithms by Nor Shahrudin, Nur Shahirah, Sidek, Khairul Azami

    Published 2020
    “…Electrocardiogram (ECG) is an electrical indicator of the heart, provides such criteria as it reflects the heart activity that can detect changes in human response which relates to our emotions and reactions. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  13. 13

    Automatic Road Network Recognition and Extraction for Urban Planning by Bong, David B L, Lai, K.C., Joseph, A.

    Published 2009
    “…These results are valuable for building road map and detecting the changes of the existing road database. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Zebrafish larvae locomotor activity detection using Convolutional NeuraL Network (CNN) by Wan Nur Azhani, Wan Samsudin, Mohd Harizan, Zul, Mohd Zamri, Ibrahim, Rohana, Abdul Karim, Wan Norhamidah, Wan Ibrahim

    Published 2022
    “…To overcome the limitations, this works aims to develop an algorithm to elucidate the zebrafish larvae locomotor activity using Convolutional Neural Network (CNN). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15

    ARDUINO-BASED FALL DETECTION AND ALERT SYSTEM by Mohd Arifin, Izuan Alif

    Published 2017
    “…This project developed a robust algorithm with a sensitive and an accurate result for fall detection device by more than 90%.…”
    Get full text
    Get full text
    Final Year Project
  16. 16

    Development of a flexible video analysis system for motion detection and alarm generation by Shafie, Amir Akramin, Ali, Md. Hazrat, Hafiz, Fadhlan, Mat Ali, Roslizar

    Published 2010
    “…This SVAS is able to detect and track interested objects. It can also detect people and recognize their activities in an application environment, such as in a room, supermarket, car, or security checkpoint. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  17. 17

    A student learning style auto-detection model in a learning management system by Rashid, Amirah, Raja Ikram, Raja Rina, Thamilarasan, Yarshini, Salahuddin, Lizawati, Abd Yusof, Noor Fazilla, Rashid, Zakiah

    Published 2023
    “…This paper proposes an auto-detection model of student learning styles in learning management systems based on student learning activities. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  18. 18
  19. 19
  20. 20

    Monitoring land use and urban changes in Kaduna using satellite data by Muhammad Kafi, Kamil, Mohd Shafri, Helmi Zuhaidi

    Published 2015
    “…Three different image classification algorithms, namely image differencing, unsupervised and supervised classification were used for the purpose of detecting change. …”
    Get full text
    Get full text
    Book