Search Results - (( parameter detection device algorithm ) OR ( java application mining algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Investigating the performance of an amplitude-independent algorithm for detecting the hand muscle activity of stroke survivors by Hameed, Husamuldeen Khalid, Wan Hasan, Wan Zuha, Shafie, Suhaidi, Ahmad, Siti Anom, Jaafar, Haslina, Inche Mat, Liyana Najwa

    Published 2020
    “…The results showed that the amplitude-independent algorithm performed better in terms of detecting weak muscle activity and resisting false alarms.…”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Mining Sequential Patterns Using I-PrefixSpan by Dhany , Saputra, Rambli Dayang, R.A., Foong, Oi Mean

    Published 2007
    “…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    A web-based implementation of k-means algorithms by Lee, Quan

    Published 2022
    “…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  7. 7
  8. 8

    Digital Analysis of Badminton Athlete Motion by Zahari, Taha, Hwa, Jen Yap, Mohammad Syawaludin Syafiq, Hassan, Wee, Kian Yeo

    Published 2015
    “…The miniaturised device, as well as Kinect, have demonstrated its efficacy in measuring the necessary parameters in analysing the performance of badminton players.…”
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    Optimize and deploy machine learning algorithms on embedded devices for manufacturing applications by Teoh, Ming Xue

    Published 2025
    “…This proposal discusses the techniques of optimizing and deploying machine learning algorithms on embedded devices for manufacturing applications; We investigate problems of printed circuit board (PCB) defects and artificial intelligence in embedded system. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  10. 10

    Development of auto-tracking mobile robot by Ahmad Shahrizan, Abdul Ghani, Suresh, Sundarajoo

    Published 2018
    “…Auto tracking mobile robot is a device that able to detect and track a target. For an auto tracking device, the most crucial part of the system is the object identification and tracking of the moving targets. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    Embedded fuzzy classifier for detection and classification of preseizure state using real EEG data by Qidwai, U., Malik, A.S., Shakir, M.

    Published 2014
    “…In order to make all this in a ubiquitous form factor, the algorithm for classification and detection of the pre-seizure conditions should be tremendously simple for processing the signal in a low cost ubiquitous microcontroller. …”
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12

    Improvement of Auto-Tracking Mobile Robot based on HSI Color Model by Sundarajoo, Suresh, Ahmad Shahrizan, Abdul Ghani

    Published 2018
    “…Auto tracking mobile robot is a device that able to detect and track a target. For an auto tracking device, the most crucial part of the system is the object identification and tracking of the moving targets. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Improved Malware detection model with Apriori Association rule and particle swarm optimization by Adebayo, Olawale Surajudeen, Abdul Aziz, Normaziah

    Published 2019
    “…These rule models are used together with extraction algorithm to classify and detect malicious android application. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Embedded Fuzzy Classifier for Detection and Classification of Preseizure state using Real EEG data by Qidwai, Uvais, Malik, Aamir Saeed, Shakir, Mohamed

    Published 2014
    “…In order to make all this in a ubiquitous form factor, the algorithm for classification and detection of the pre-seizure conditions should be tremendously simple for processing the signal in a low cost ubiquitous microcontroller. …”
    Get full text
    Get full text
    Book Section
  15. 15

    Enhanced android malware detection framework using API application framework layer by Abdul Ghani, Saidah Mastura

    Published 2023
    “…To improve the performance, a combination of parameters instead of using a single parameter should be utilised and a combination of dynamic and static analysis techniques should also be used for future research.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    Embedded Fuzzy Classifier for Detection and Classification of Preseizure State Using Real EEG Data by Qidwai, Uvais, Malik, Aamir Saeed, Shakir, Mohamed

    Published 2013
    “…This shown various performance modes of the system and confirms the detection of pre-seizure state for a number of parameters related to the patients such as age, gender, etc... …”
    Get full text
    Get full text
    Get full text
    Book Section
  17. 17

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
    Get full text
    Get full text
    Thesis
  18. 18

    Detection of black hole nodes in mobile ad hoc network using hybrid trustworthiness and energy consumption techniques by Mustafa, Ahmed Sudad

    Published 2017
    “…In this thesis, a hybrid detection algorithm mechanism has been proposed which combines two detection algorithms based on nodes’ trustworthiness and energy consumption in a parallel manner in order to detect the black hole nodes. …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    Differential evolution algorithm for linear frequency modulation radar signal denoising by Al-Dabbagh, Mohanad Dawood Hasan, Raja Abdullah, Raja Syamsul Azmir, Al-Dabbagh, Rawaa Dawoud Hassan, Hashim, Fazirulhisyam

    Published 2013
    “…This paper looks at the feasibility of using the differential evolution algorithm to estimate the linear frequency modulation received signal parameters for radar signal denoising. …”
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20