Search Results - (( java application sensor algorithm ) OR ( data normalization towards algorithm ))

Refine Results
  1. 1

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…The process begins through the monitoring of plants using sensors connected to the Arduino device. Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2
  3. 3
  4. 4

    An improved recommender system based on normalization of matrix factorization and collaborative filtering algorithms by Zahid, Aafaq

    Published 2015
    “…The hypothesis is that the tendency of normalization technique to simplify the data combined with the accuracy of the neighborhood models can improve the accuracy of the RS. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Human activity recognition via accelerometer and gyro sensors by Tee, Jia Lin

    Published 2023
    “…To implement the data engineering system proposed, two mobile applications, SensorData and SensorDataLogger with user-friendly interfaces and intuitive functionalities are developed using Java programming language and Android Studio. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  6. 6

    The Impact of Normalization Techniques on Performance Backpropagation Networks by Norlida, Hassan

    Published 2004
    “…To explore the impact of normalization technique on the performance on NN, medical datasets with Boolean target were preprocessed, trained, validated and tested using backpropagation learning algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Network instrusion prevention system ( NIPS) based on network intrusion detection system (NIDS) and ID3 algorithm decision tree classifier by Syurahbil, A

    Published 2011
    “…Network security has gained significant attention in research and industrial communities.Due to the increasing threat of the network intrusion,firewalls have become important elements of the security policy.Firewall performance highly depends toward number of rules,because the large more rules the consequence makes downhill performance progressively.Firewall can be allow or deny access network packets incoming and outgoing into Local Area Network(LAN),but firewall can not detect intrusion.To distinguishing an intrusion network packet or normal is very difficult and takes a lot of time.An analyst must review all the network traffics previously.In this study,a new way to make the rules that can determine network packet is intrusion or normal automatically.These rules implemented into firewall as prevention,which if there is a network packet that match these rules then network packet will be dropped.This is called Network Intrusion Prevention System(NIPS).These rules are generated based on Network Intrusion Detection System(NIDS)and Iterative Dichotomiser 3 (ID3)Algorithm Decision Tree Classifier,which as data training is intrusion network packet and normal network packets from previous network traffics.The experiment is successful,which can generate the rules then implemented into a firewall and drop the intrusion network packet automatically.Moreover,this way can minimize number of rules in firewall.…”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9

    Frequent Lexicographic Algorithm for Mining Association Rules by Mustapha, Norwati

    Published 2005
    “…The scale-up experiment showed that the proposed algorithm is more scalable than the other existing algorithms. …”
    Get full text
    Get full text
    Thesis
  10. 10

    An Integrated Principal Component Analysis And Weighted Apriori-T Algorithm For Imbalanced Data Root Cause Analysis by Ong, Phaik Ling

    Published 2016
    “…A semiconductor manufacturing case study with Work In Progress data and true alarm data is used to proof the proposed algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12

    Forensic language of property theft genre based on mathematical formulae and machine learning algorithms / Hana' Abd Razak by Abd Razak, Hana'

    Published 2020
    “…Four traits was discovered namely spine, pelvis, knee and ankle. Next, data collection of normal and anomalous behaviour is collected using Kinect sensor. …”
    Get full text
    Get full text
    Thesis
  13. 13

    An Improved Artificial Dendrite Cell Algorithm for Abnormal Signal Detection by Mohamad Mohsin, Mohamad Farhan, Abu Bakar, Azuraliza, Hamdan, Abdul Razak, Abdul Wahab, Mohd Helmy

    Published 2018
    “…In dendrite cell algorithm (DCA), the abnormality of a data point is determined by comparing the multi-context antigen value (MCAV) with anomaly threshold. …”
    Get full text
    Get full text
    Article
  14. 14

    Enhanced dynamic security assessment for power system under normal and fake tripping contingencies. by A. Salih, Qusay

    Published 2019
    “…The hybrid logistic model tree (hybrid LMT) approach proposed in this study combines the symmetrical uncertainties (SU) algorithm and the logistic model tree (LMT) algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Swarm negative selection algorithm for electroencephalogram signals classification by Sahel Ba-Karait, Nasser Omer, Shamsuddin, Siti Mariyam, Sudirman, Rubita

    Published 2009
    “…The SNS classification model use negative selection and PSO algorithms to form a set of memory Artificial Lymphocytes (ALCs) that have the ability to distinguish between normal and epileptic EEG patterns. …”
    Get full text
    Article
  16. 16

    An improved artificial dendrite cell algorithm for abnormal signal detection by Mohamad Mohsin, Mohamad Farhan, Abu Bakar, Azuraliza, Hamdan, Abdul Razak, Abdul Wahab, Mohd Helmy

    Published 2018
    “…In dendrite cell algorithm (DCA), the abnormality of a data point is determined by comparing the multi-context antigen value (MCAV) with anomaly threshold. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    An adaptive anomaly threshold in artificial dendrite cell algorithm by Mohamad Mohsin, Mohamad Farhan, Abu Bakar, Azuraliza, Hamdan, Abdul Razak

    Published 2017
    “…The dendrite cell algorithm (DCA) relies on the multi-context antigen value (MCAV) to determine the abnormality of a record by comparing it with anomaly threshold.In practice, the threshold is pre-determined before mining based on previous information and the existing MCAV is inefficient when expose to extreme values.This causes the DCA fails to detect unlabeled data if the new pattern distinct from previous information and reduces the detection accuracy.This paper proposed an adaptive anomaly threshold for DCA using the statistical cumulative sum (CUSUM) with the aim to improve its detection capability.In the proposed approach, the MCAV were normalized with upper CUSUM and the new anomaly threshold was calculated during run time by considering the acceptance value and min MCAV.From the experiments towards 12 datasets, the new version of DCA generated a better detection result than its previous version in term of sensitivity, specificity, false detection rate, and accuracy.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18

    Design & Development of a Robotic System Using LEGO Mindstorm by Abd Manap, Nurulfajar, Md Salim, Sani Irwan, Haron, Nor Zaidi

    Published 2006
    “…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. Ultimately, the algorithm development program designed earlier is linked up directly to the robotic model for program implementation and verification. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19
  20. 20

    Dominance relationship-based skyline query framework over dynamic and incomplete database by Dehaki, Ghazaleh Babanejad

    Published 2020
    “…These changes are necessary as databases must reflect the current and latest information of the applications. The changes are normally achieved through data manipulation operations and data definition operations. …”
    Get full text
    Get full text
    Thesis