Search Results - (( automatic identification system algorithm ) OR ( java application mining algorithm ))
Search alternatives:
- identification system »
- application mining »
- system algorithm »
- java application »
- mining algorithm »
-
1
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
2
-
3
System Identification And Control Of Automatic Car Pedal Pressing System For Low-Speed Driving In A Road Traffic Delay
Published 2022“…This project presents system identification and control of automatic car pedal pressing system for low-speed driving in a road traffic delay. …”
Get full text
Get full text
Undergraduates Project Papers -
4
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
Get full text
Get full text
Get full text
Article -
5
Smart Cards And The Fingerprint : A Proposed Framework For The Automatic Teller Machine (ATM) System
Published 2002“…As a result, the research proposed a framework for user identification and authentication in automatic teller machine (ATM) systems using fingerprints and smart cards as opposed to the PIN and magnetic-stripe cards. …”
Get full text
Get full text
Get full text
Thesis -
6
Real-time system identification of an unmanned quadcopter system using fully tuned radial basis function neural networks
Published 2021“…Radial basis function network (RBF) based on system identification can be utilised as an alternative technique for quadcopter modelling. …”
Get full text
Get full text
Article -
7
-
8
Automatic identification of epileptic seizures from EEG signals using sparse representation-based classification
Published 2020“…In this research, a fully automated system is presented to automatically detect the various states of the epileptic seizure. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
9
Online fingerprint recognition
Published 2010“…The systems are increasingly employed into business, trading and living fields for automatic personal identification. …”
Get full text
Get full text
Undergraduates Project Papers -
10
-
11
Analysis of minutia extraction techniques in fingerprint recognition.
Published 2012Get full text
Working Paper -
12
Real-time system identification of an unmanned quadcopter system using fully tuned radial basis function neural networks
Published 2021“…Radial basis function network (RBF) based on system identification can be utilised as an alternative technique for quadcopter modelling. …”
Get full text
Get full text
Article -
13
Evolutionary Programming (EP) based technique for secure point identification with load shedding technique in power transmission / Abdul Rahman Minhat
Published 2008“…This algorithm is used to estimate the maximum loadability point in power system. …”
Get full text
Get full text
Thesis -
14
Fault identification in pipeline system using normalized hilbert huang transform and automatic selection of intrinsic mode function
Published 2018Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
15
Fuzzy modelling for distillation column
Published 2005“…This paper presents a hybrid method to tune the parameters of TS fuzzy system automatically using Genetic Algorithms (GA) and Recursive Least Square (RLS) technique. …”
Get full text
Conference or Workshop Item -
16
Automatic clustering of generalized regression neural network by similarity index based fuzzy c-means clustering
Published 2004“…We applied the technique for system identification and modeling and found the results to be encouraging and efficient. …”
Get full text
Get full text
Get full text
Article -
17
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
18
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
19
Fault Detection and Identification in Quadrotor System (Quadrotor Robot)
Published 2016Get full text
Get full text
Get full text
Conference or Workshop Item -
20
Fingerprint feature extraction based discrete cosine transformation (DCT)
Published 2009“…Fingerprint identification and verification are one of the most significant and reliable identification methods. …”
Get full text
Get full text
Get full text
Get full text
Proceedings
