Search Results - (( virtual detection method algorithm ) OR ( java application mining algorithm ))
Search alternatives:
- application mining »
- virtual detection »
- method algorithm »
- java application »
- mining algorithm »
-
1
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
2
-
3
Efficient distance computation algorithm between nearly intersected objects using dynamic pivot point in virtual environment application
Published 2014Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
4
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
Get full text
Get full text
Get full text
Article -
5
Efficient distance computation algorithm between nearly intersect objects using dynamic pivot point in virtual environment application
Published 2013Get full text
Get full text
Conference or Workshop Item -
6
-
7
Distance computation between convex objects using axis-aligned bounding-box in virtual environment application
Published 2013“…Performing collision detection between convex objects in virtual environment simulation is one of vital problems in computer visualization research area. …”
Get full text
Get full text
Conference or Workshop Item -
8
Balanced hierarchical method of collision detection in virtual environment
Published 2011“…In this paper, we introduced a splitting algorithm that is able to successfully divide the hierarchical construction in virtual environment. …”
Get full text
Get full text
Book Chapter -
9
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
10
Modified canny edge detection technique for identifying endpoints
Published 2022Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
11
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
12
Quad separation algorithm for bounding-volume hierarchies construction in virtual environment application
Published 2013“…Thus, in this paper we presented our novel algorithm for constructing Bounding-Volume Hierarchies using Quad Splitting method. …”
Get full text
Get full text
Article -
13
Comparing seabed roughness result from QPS fledermaus software, benthic trrain modeler [BTM] and developed model derived FRM slope variability algorithm for hard coral reef detecti...
Published 2018“…Slope variability model is an algorithm that is being used for detecting terrain roughness. …”
Get full text
Get full text
Thesis -
14
-
15
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
16
An ensemble feature selection method to detect web spam
Published 2018“…An ensemble feature selection method has been proposed in this paper to detect web spam. …”
Get full text
Get full text
Get full text
Article -
17
LEVEL-BASED CORRESPONDENCE APPROACH TO COMPUTATIONAL STEREO
Published 2010“…Correspondence is the method of detecting the real world object reflections in two camera views. …”
Get full text
Get full text
Thesis -
18
-
19
Vision-Based Hand Detection and Tracking Using Fusion of Kernelized Correlation Filter and Single-Shot Detection
Published 2023“…This study explores the use of deep learning techniques for fast and robust hand detection and tracking. A novel algorithm is proposed by combining the Kernelized Correlation Filter (KCF) tracker with the Single-Shot Detection (SSD) method. …”
Get full text
Get full text
Get full text
Article -
20
An early warning detection system of terrorism in indonesia from Twitter contents using naïve bayes algorithm
Published 2020Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item
