Search Results - (( safety implementation level algorithm ) OR ( java application mining algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Mining Sequential Patterns Using I-PrefixSpan by Dhany , Saputra, Rambli Dayang, R.A., Foong, Oi Mean

    Published 2007
    “…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    A web-based implementation of k-means algorithms by Lee, Quan

    Published 2022
    “…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  6. 6
  7. 7

    Risk assessment for safety and health algorithm for building construction in Oman by Al-Anbari, Saud Said

    Published 2015
    “…By implementing definitions of safety and health on the identified extreme and high-risk levels, the key risks in this study have been classified into safety risks and health risks. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
    Get full text
    Get full text
    Thesis
  9. 9

    Analysis of Traffic Accident Patterns Using Association Rule Mining by Yudy, Pranata, Tri Basuki, Kurniawan, Edi Surya, Negara, Ahmad Haidar, Mirza

    Published 2024
    “…For example, analyzing variables at different accident levels allows policymakers to identify critical factors contributing to accidents, implement tailored safety measures, and prioritize infrastructure improvements. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Case driven TLC model checker analysis in energy scenario by Shkarupylo, Vadym, Blinov, Ihor V., Dusheba, Valentyna, Alsayaydeh, Jamil Abedalrahim Jamil

    Published 2023
    “…To foster the functional safety of corresponding program-algorithmic solutions, the model checking techniques and related tools are applied to the formal specifications of named solutions. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    Measuring aircraft altimetry system error using automatic dependent surveillance-broadcast data / Kalyani Bahskaran by Kalyani , Bahskaran

    Published 2021
    “…RVSM focused on reducing vertical separation minimum from 2000 feet to 1000 feet between flight level FL290 and FL410. Implementation of RVSM stresses the accuracy of aircraft avionics that report altitude and requires the Regional Monitoring Agency (RMA) to monitor the aircraft's Height Keeping Performance (HKP) to ensure the aviation safety of their airspace. …”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    Performance evaluation of direction of arrival (DOA) for linear array antenna design using multiple signal classification (MUSIC) algorithm in variation of displacement vectors and... by Hamzah, Norhayati

    Published 2007
    “…In Smart Antenna system, the intelligence of the system depends on the information collected, processed and implemented through an algorithm i.e. Multiple Signal Classification (MUSIC). …”
    Get full text
    Get full text
    Thesis
  13. 13

    Hardware software partitioning of crankshaft function in engine control units using FPGA-based testing by Yeoh, Khai Chein, Rahmat, Mohamad Fariq, Abd Rahman, Fatimah, Kamsani, Noor Ain, Rokhani, Fakhrul Zaman

    Published 2017
    “…This project proposes hardware and software co-design that provides flexibility, timing precision, performance, manageable software design, complexity and meets safety requirement. The solution is aligned with Application-Specific Integrated Circuit (ASIC), which features complex control algorithm, implementation in hardware and controllable through firmware.…”
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14

    VANET SECURITY FRAMEWORK FOR LOW LATENCY SAFETY APPLICATIONS by WAGAN, ASIF ALI

    Published 2012
    “…Presently, VANET technology is surrounded with security challenges and it is essentially important for VANET to successfully implement a security measure according to the safety applications requirements. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Development of low-overhead soft error mitigation technique for safety critical neural networks applications by Khalid Adam, Ismail Hammad

    Published 2021
    “…DNN-based healthcare applications are safety-critical systems that require highreliability implementation due to a high risk of human death or injury in case of malfunction. …”
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17

    Seat belt control system : drowsiness detector system by Nur Aisyah, Abdul Rahman

    Published 2022
    “…At the end, the developed system can be implemented in older models of vehicles to decrease the rate of accidents and fatalities in Malaysia, as well improve safety of the driver.…”
    Get full text
    Get full text
    Undergraduates Project Papers
  18. 18
  19. 19

    High-throughput and energy-efficient Contiki MAC layer scheme in IEEE 802.15.4 for structural health monitoring by Al-Mekhlafi, Mohamed Abdulkarem Taher

    Published 2021
    “…L-TDMA shows a remarkable ability to conserve power in comparison to other protocols in different operating systems. Finally, the implementation of the developed embedded algorithms for strain-based applications resulted in a power consumption reduction of 77% compared to centralized processing.…”
    Get full text
    Get full text
    Thesis
  20. 20