Search Results - (( using mapping force algorithm ) OR ( java application mining algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Mining Sequential Patterns Using I-PrefixSpan by Dhany , Saputra, Rambli Dayang, R.A., Foong, Oi Mean

    Published 2007
    “…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Labview Based Pid Algorithm Development for Z Motion Control in Atomic Force Microscopy by Teh, Yong Hui

    Published 2015
    “…It provide a high resolution of 3 dimensional imaging. Thus, it is commonly used in mapping, measuring and scaling in nano sizes. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  6. 6

    A web-based implementation of k-means algorithms by Lee, Quan

    Published 2022
    “…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  7. 7
  8. 8
  9. 9

    Enhancing benthic habitat mapping: A review of integrating satellite and side scan sonar data for improved classification accuracy by Yeong, Wei Yi, Chong, Wei Sheng, Ching Hue, Imelus Nius

    Published 2024
    “…The contribution of slope derived from bathymetry varies with extraction algorithms; the use of more sophisticated algorithms leads to higher accuracy. …”
    Get full text
    Get full text
    Article
  10. 10

    Securing password authentication using MD5 algorithm by Siti Nabilah , Mohammad Zain

    Published 2014
    “…Apart from protection, a step toward perfect security has taken by using MD5 algorithm…”
    Get full text
    Get full text
    Undergraduates Project Papers
  11. 11

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
    Get full text
    Get full text
    Thesis
  12. 12

    Software User Interface and Algorithm Development for Signal and Noise Characterization by Phoong, Wei Siang

    Published 2015
    “…The data from photodiode is read by LabVIEW software for further develop to obtain useful output data. The previous task done by senior is I/V converter and algorithm for detect location of photodiode are implement by using LM741 op-amp chip on printed circuit board. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  13. 13

    Comparison between Lamarckian Evolution and Baldwin Evolution of neural network by Taha, Imad, Inazy, Qabas

    Published 2006
    “…However, Lamarckian learning does alleviate the problem of multiple genotypes mapping to the same phenotype. Baldwinian learning uses learning algorithm to change the fitness landscape, but the solution that is found is not encoded back into genetic string. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Cryptanalysis and design of chaos based image encryption schemes by Wong , Kuan Wai

    Published 2025
    “…To address these challenges, we propose secure image encryption schemes that are based on enhanced chaotic maps. Specifically, we enhance the chaotic behavior of one-dimensional and two-dimensional chaotic maps using cascading techniques. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  15. 15

    A simulation and experimental study on wheeled mobile robot path control in road roundabout environment by Ali, Mohammed A. H., Mailah, Musa

    Published 2019
    “…The road’s roundabout is represented in a grid map and the path of the mobile robot is determined using a novel approach, the so-called laser simulator technique within the roundabout environment according to the respective road rules. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Intelligent motion planning of a mobile robot by using convolutional neural network / Siti Asmah Abdullah by Siti Asmah, Abdullah

    Published 2019
    “…Planning the path of the mobile robot by using Convolutional Neural Network (CNN) is important in optimizing the cost in terms of energy, time and human intervention force. …”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    Modular motor driver with torque control for gripping mechanism by How D.N.T., Baharuddin M.Z., Mohideen S.S.K., Sahari K.S.M., Anuar A.

    Published 2023
    “…Using the same hardware configuration, the different algorithms produced different outcomes on the output of the controller. …”
    Conference paper
  18. 18

    On the use of fuzzy rule interpolation techniques for monotonic multi-input fuzzy rule base models by Tay, Kai Mei, Chee, Peng Lim

    Published 2009
    “…This can be accomplished with the use of a search algorithm, such as the brute force, genetic algorithm or etc…”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Computational methods for self-assembly of DNA nanostructures / Ong Hui San by Ong, Hui San

    Published 2016
    “…Several approaches have been adopted including development of an autonomous tool that incorporated evolutionary optimization algorithm in constructing these heterogeneous DNA shapes and the application of heuristic through undirected graph theory as an annotation schema to produce the connectivity maps. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Multi-array sensorised pillowcase as call detection alarm system for in ward tetraplegic patient / Normazlianita Mohamad Alias by Normazlianita, Mohamad Alias

    Published 2021
    “…A case study was performed on an able-bodied person and two tetraplegic patients who used the sensor as the pillow cover. Findings from this case study have demonstrated the ability to map the force on the surface of the pillow and subsequently the location of the force applied with 71% accuracy and 70% sensitivity. …”
    Get full text
    Get full text
    Get full text
    Thesis