Search Results - (( practice detection system algorithm ) OR ( java application mining algorithm ))
Search alternatives:
- practice detection »
- application mining »
- system algorithm »
- java application »
- mining algorithm »
-
1
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
2
-
3
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
Get full text
Get full text
Get full text
Article -
4
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
7
Development of a cost efficient vision system for defects detection / Muhammad Zarif Kamarudin
Published 2010“…A machine vision system is use in many applications such as parts sortation, defect detection, object recognition and parts counting. …”
Get full text
Get full text
Monograph -
8
An enhancement of classification technique based on rough set theory for intrusion detection system application
Published 2019“…An Intrusion Detection System (IDS) is capable to detect unauthorized intrusions into computer systems and networks by looking for signatures of known attacks or deviations of normal activity. …”
Get full text
Get full text
Thesis -
9
Development of cost efficient vision system for defects detection / Muhammad Zarif Kamarudin
Published 2010“…A machine vision system is use in many applications such as parts sortation, defect detection, object recognition and parts counting. …”
Get full text
Get full text
Thesis -
10
Amplitude independent muscle activity detection algorithm of soft robotic glove system for hemiparesis stroke patients using single sEMG channel
Published 2020“…Many algorithms have been developed in the literature to detect muscle activities; however, most of these algorithms depend on amplitude features in the detection process. …”
Get full text
Get full text
Thesis -
11
Weeds detection for agriculture using Convolutional Neural Network (CNN) algorithm / Khairun Nisa Mohammad Nasir
Published 2024“…Modern agriculture recognizes weed detection systems as crucial tools to reduce the obstacles caused by weeds, enhancing crop growth and yield. …”
Get full text
Get full text
Thesis -
12
Soft robotic glove system controlled with amplitude independent muscle activity detection algorithm by using single sEMG channel
Published 2018“…Employing single sEMG channel with computation efficient control algorithm leads to reducing the cost and the size of the soft robotic glove system and make it more practical for utilization in daily basis.…”
Get full text
Get full text
Conference or Workshop Item -
13
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
Get full text
Get full text
Thesis -
14
LTE-based passive radar for ground target detection and tracking
Published 2015“…The systems capability to detect multi-targets moving on the ground in the same scene was also examined. …”
Get full text
Get full text
Thesis -
15
Adaptive grid-meshed-buffer clustering algorithm for outlier detection in evolving data stream
Published 2023“…Hence, the empirical evidence highlights the superiority and practical relevance of the proposed algorithm in tackling outlier detection in evolving data streams. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
16
Abnormalities and fraud electric meter detection using hybrid support vector machine & genetic algorithm
Published 2023“…This paper presents an intelligent system to reduce Non Technical Loss (NTL) using hybrid Support Vector Machine (SVM) and Genetic Algorithm (GA). …”
Conference Paper -
17
Cloud co-residency denial of service threat detection inspired by artificial immune system
Published 2024journal::journal article -
18
SMART: a subspace based malicious peers detection algorithm for P2P systems
Published 2013“…Firstly, we define malicious peers and show their influence on the system performance. Secondly, based on Multiscale Principal Component Analysis (MSPCA) and control chart, a Subspace based MAlicious peeRs deTecting algorithm (SMART) is brought forward. …”
Get full text
Get full text
Get full text
Article -
19
Face recognition in video surveillance systems as an application of smart cities
Published 2023“…The experimental results demonstrate practically applying of face detection from several foreshortenings and recognition results. …”
Article -
20
Real-time intelligent recycle waste detection and classification using you only look once version 5 / Aiman Syafwan Amran
Published 2023“…The recommendation on the future work is to improve the detection model for it to be able to detect small size object from the image to make the system more reliable.…”
Get full text
Get full text
Thesis
