Search Results - (( developing damage control algorithm ) OR ( java implementation mining algorithm ))
Search alternatives:
- implementation mining »
- java implementation »
- developing damage »
- mining algorithm »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
2
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
Get full text
Get full text
Get full text
Article -
3
Scalable approach for mining association rules from structured XML data
Published 2009“…Many techniques have been proposed to tackle the problem of mining XML data we study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
Get full text
Get full text
Conference or Workshop Item -
4
Mining association rules from structured XML data
Published 2009“…Many techniques have been proposed to tackle the problem of mining XML data. We study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
Get full text
Get full text
Conference or Workshop Item -
5
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Image clustering comparison of two color segmentation techniques
Published 2010“…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
Get full text
Get full text
Thesis -
8
Modular motor driver with torque control for gripping mechanism
Published 2023“…Torque control algorithm in a gripping actuator will allow sufficient force to be exerted to the object grasped without damaging the object. …”
Conference paper -
9
Evaluation Algorithm - Based on PID Controller Design for the Unstable Systems
Published 2015“…Evaluation algorithm develops to tune the PID controller for a better performance. …”
Get full text
Get full text
Get full text
Article -
10
Intelligent Evolutionary Controller for Flexible Robotic Arm
Published 2020“…These problems may eventually cause damage to the highly stressed structures. This research focused on the development of the intelligent evolutionary controller algorithms for controlling flexible robotic arm manipulator. …”
Get full text
Get full text
Get full text
Article -
11
Simulation and Design of an Intelligent Mobile Robot for Fire Fighting
Published 2003“…Keywords: (Fuzzy logic control, mobile robot, part recognition algorithms)…”
Get full text
Get full text
Thesis -
12
Development of elasto-plastic viscous damper finite element model for reinforced concrete frames
Published 2014“…The experience of recent severe earthquakes indicates that sometimes the earthquake energy dissipation devices are damaged during earthquakes and there is no function for structural control system. …”
Get full text
Get full text
Article -
13
Applications of deep learning algorithms for supervisory control and data acquisition intrusion detection system
Published 2022“…In this paper, we have examined and presented the most recent research on developing robust IDSs using Deep Learning (DL) algorithms, including Convolutional Neural Networks (CNN), Recurrent Neural Networks (RNN), Stacked Autoencoders (SAE), and Deep Belief Networks (DBN). …”
Get full text
Get full text
Get full text
Article -
14
Intelligent DNA signature detection for internet worms
Published 2011“…Active worms spread in an automated fashion flooding the Internet in a very short time.Slammer worm infected more than 90% of vulnerable machines within 10 minutes on January 25th, 2003.Hence it is necessary to monitor and detect the worms as soon as they are introduced to minimize the damage caused by them.This project concentrates on developing an anti-scanning worm detection system that can automatically detect and control the spread of internet scanning worms without any manual intervention.The Intelligent Failure Connection Algorithm (IFCA) developed in this project can detect both stealth and normal worms within a short time.Experiments conducted as part of the evaluation shows that IFCA detects a worm within two scanning cycles of the worm.This is faster than any of the currently available algorithms or mechanisms reported in the literature.The IFCA uses Artificial Immune System (AIS) for the purpose of monitoring and detecting the worms.The Traffic Signature Algorithm (TSA) developed in the project captures the traffic signature of the worm from the infector when it sends the traffic to the victim.The Intelligent DNA Signature Detection Algorithm (IDNASDA) algorithm works by breaking an infection session into different infection phases, each phase containing a number of different traffic such as Internet Control Message Protocol (ICMP), Transmission Control Protocol (TCP), or User Datagram Protocol (UDP).Finally it converts the traffic signature to DNA signature.The tests carried out show that the IDNASD could detect DNA signature for MSBlaster worm.…”
Get full text
Get full text
Get full text
Get full text
Monograph -
15
Design and implementation of a real-time adaptive learning algorithm controller for a 3-DOF parallel manipulator / Mustafa Jabbar Hayawi
Published 2015“…These effects, if not controlled, would lead to large scale oscillations that would damage system components. …”
Get full text
Get full text
Thesis -
16
Design of a swimming small soft robot for underwater applications
Published 2024“…This directional control, along with linear swimming, was incorporated into a swimming algorithm controlled by three push buttons. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
17
Pneumatic Positioning Control System Using Constrained Model Predictive Controller: Experimental Repeatability Test
Published 2021“…Model predictive controller (MPC) is one of the predictive controllers that is able to consider the constraint of the system in its algorithm. …”
Get full text
Get full text
Get full text
Get full text
Article -
18
Modelling of flexible beam based on ant colony optimization and cuckoo search algorithms
Published 2021“…Therefore, two type of algorithms was used in this work for modelling development of flexible beam structure, which are ant colony optimization (ACO) and cuckoo search algorithm (CSA). …”
Get full text
Get full text
Article -
19
Tuning of Distillation Column Control
Published 2015“…Once the designing of the controller is done, an algorithm is developed to make sure that the tuning of distillation column control can be done efficiently. …”
Get full text
Get full text
Final Year Project -
20
Intelligent Tuning of PID Controller for Double-Link Flexible Robotic Arm Manipulator by Artificial Bee Colony Algorithm
Published 2020“…These problems may eventually cause damage to the highly stressed structure. This research focuses on the development of intelligent controller utilizing artificial bee colony (ABC) algorithm to tune proportional integral derivative (PID) parameters for controlling two-link flexible manipulator (TLFRM). …”
Get full text
Get full text
Get full text
Get full text
Book Chapter
