Search Results - (( problem using cross algorithm ) OR ( java application sensor algorithm ))
Search alternatives:
- application sensor »
- java application »
- sensor algorithm »
- cross algorithm »
-
1
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…The process begins through the monitoring of plants using sensors connected to the Arduino device. Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. …”
Get full text
Get full text
Get full text
Article -
2
Design Of Robot Motion Planning Algorithm For Wall Following Robot
Published 2006Get full text
Get full text
Monograph -
3
Human activity recognition via accelerometer and gyro sensors
Published 2023“…To implement the data engineering system proposed, two mobile applications, SensorData and SensorDataLogger with user-friendly interfaces and intuitive functionalities are developed using Java programming language and Android Studio. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
4
Classification of credit card holder behavior using K Nearest Neighbor algorithm / Ahmad Faris Rahimi
Published 2017“…Testing of the application are using 10-Fold Cross Validation technique. 90% of the data be used as a training and another 10% be used for the testing part. …”
Get full text
Get full text
Thesis -
5
An improved method using fuzzy system based on hybrid boahs for phishing attack detection
Published 2022“…The experiment was executed by using k-fold cross validation techniques for predicting the classification algorithm performance. …”
Get full text
Get full text
Thesis -
6
Hybrid ant colony optimization and genetic algorithm for rule induction
Published 2020“…The AntMiner classifier is efficient, useful and commonly used for solving rulebased classification problems in data mining. …”
Get full text
Get full text
Get full text
Article -
7
-
8
Optimization of job scheduling in a machine shop using genetic algorithm
Published 2002“…Computer runs were carried out with these parameters at various levels and the results indicated that, only probability of mutation, the combined effect of maximum generation and probability of crossing are significant at 10. It is suggested that the minimum values of these parameters be used for scheduling problems.…”
Get full text
Get full text
Article -
9
Optimization of job scheduling in a machine shop using genetic algorithm
Published 2002“…Computer runs were carried out with these parameters at various levels and the results indicated that, only probability of mutation, the combined effect of maximum generation and probability of crossing are significant at 10. It is suggested that the minimum values of these parameters be used for scheduling problems.…”
Get full text
Get full text
Article -
10
Case Slicing Technique for Feature Selection
Published 2004“…Case Slicing Technique (CST) helps in identifying the subset of features used in computing the similarity measures needed by classification algorithms. …”
Get full text
Get full text
Thesis -
11
3D face registration across pose variation and facial expression using cross profile alignment
Published 2011“…The proposed thesis uses a local-based approach known as Cross Profile Alignment (CPA) as an alternative to the global-based approach, utilizing the facial feature of a face surface as an attempt to cater all the above problems. …”
Get full text
Get full text
Thesis -
12
Flexible job shop scheduling using priority heuristics and genetic algorithm
Published 2010“…Then, the validation of proposed genetic algorithm with reinforced initial population (GA2) has been checked with random keys genetic algorithm (RKGA). …”
Get full text
Get full text
Thesis -
13
-
14
Non-probabilistic approach to cooperative position tracking in large swarm of simple mobile robots using triangular cross-observation
Published 2013“…The performance of the algorithm was validated and compared against that of the EKF through series of simulations using Stage multi-agent simulator. …”
Get full text
Get full text
Thesis -
15
Image Reconstruction Algorithm for Electrical Charge Tomography System
Published 2010Get full text
Get full text
Article -
16
HYBRID WATER CYCLE OPTIMIZATION ALGORITHM WITH SIMULATED ANNEALING FOR SPAM EMAIL DETECTION
Published 2022“…For the training and validation datasets, cross-validation was performed, and seven datasets were used to evaluate the suggested spam classification…”
Get full text
Thesis -
17
-
18
A novel high performance routing technique for cross-referencing DMFBs
Published 2012Get full text
Working Paper -
19
-
20
Towards cross-site scripting vulnerability detection in mobile web applications
Published 2018“…It proposes an enhanced genetic algorithm-based approach that detects cross-site scripting vulnerabilities in mobile versions of web applications. …”
Get full text
Get full text
Get full text
Article
