Search Results - (( developing damage control algorithm ) OR ( java implementation mining algorithm ))

Refine Results
  1. 1

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Scalable approach for mining association rules from structured XML data by Abazeed, Ashraf Riad, Mamat, Ali, Sulaiman, Md. Nasir, Ibrahim, Hamidah

    Published 2009
    “…Many techniques have been proposed to tackle the problem of mining XML data we study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    Mining association rules from structured XML data by Abazeed, Ashraf Riad, Mamat, Ali, Sulaiman, Md. Nasir, Ibrahim, Hamidah

    Published 2009
    “…Many techniques have been proposed to tackle the problem of mining XML data. We study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    A web-based implementation of k-means algorithms by Lee, Quan

    Published 2022
    “…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  6. 6

    Image clustering comparison of two color segmentation techniques by Subramaniam, Kavitha Pichaiyan

    Published 2010
    “…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Modular motor driver with torque control for gripping mechanism by How D.N.T., Baharuddin M.Z., Mohideen S.S.K., Sahari K.S.M., Anuar A.

    Published 2023
    “…Torque control algorithm in a gripping actuator will allow sufficient force to be exerted to the object grasped without damaging the object. …”
    Conference paper
  9. 9

    Evaluation Algorithm - Based on PID Controller Design for the Unstable Systems by Wan Ismail, Ibrahim, Erliza, Serri, Mohd Riduwan, Ghazali

    Published 2015
    “…Evaluation algorithm develops to tune the PID controller for a better performance. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Intelligent Evolutionary Controller for Flexible Robotic Arm by Annisa, Jamali, Intan Z., Mat Darus

    Published 2020
    “…These problems may eventually cause damage to the highly stressed structures. This research focused on the development of the intelligent evolutionary controller algorithms for controlling flexible robotic arm manipulator. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Simulation and Design of an Intelligent Mobile Robot for Fire Fighting by Chor, Keong Seng

    Published 2003
    “…Keywords: (Fuzzy logic control, mobile robot, part recognition algorithms)…”
    Get full text
    Get full text
    Thesis
  12. 12

    Development of elasto-plastic viscous damper finite element model for reinforced concrete frames by Hejazi, Farzad, Zabihi, Alireza, Jaafar, Mohd Saleh

    Published 2014
    “…The experience of recent severe earthquakes indicates that sometimes the earthquake energy dissipation devices are damaged during earthquakes and there is no function for structural control system. …”
    Get full text
    Get full text
    Article
  13. 13

    Applications of deep learning algorithms for supervisory control and data acquisition intrusion detection system by Balla, Asaad, Habaebi, Mohamed Hadi, Islam, Md Rafiqul, Mubarak, Sinil

    Published 2022
    “…In this paper, we have examined and presented the most recent research on developing robust IDSs using Deep Learning (DL) algorithms, including Convolutional Neural Networks (CNN), Recurrent Neural Networks (RNN), Stacked Autoencoders (SAE), and Deep Belief Networks (DBN). …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Intelligent DNA signature detection for internet worms by Ghazali, Osman

    Published 2011
    “…Active worms spread in an automated fashion flooding the Internet in a very short time.Slammer worm infected more than 90% of vulnerable machines within 10 minutes on January 25th, 2003.Hence it is necessary to monitor and detect the worms as soon as they are introduced to minimize the damage caused by them.This project concentrates on developing an anti-scanning worm detection system that can automatically detect and control the spread of internet scanning worms without any manual intervention.The Intelligent Failure Connection Algorithm (IFCA) developed in this project can detect both stealth and normal worms within a short time.Experiments conducted as part of the evaluation shows that IFCA detects a worm within two scanning cycles of the worm.This is faster than any of the currently available algorithms or mechanisms reported in the literature.The IFCA uses Artificial Immune System (AIS) for the purpose of monitoring and detecting the worms.The Traffic Signature Algorithm (TSA) developed in the project captures the traffic signature of the worm from the infector when it sends the traffic to the victim.The Intelligent DNA Signature Detection Algorithm (IDNASDA) algorithm works by breaking an infection session into different infection phases, each phase containing a number of different traffic such as Internet Control Message Protocol (ICMP), Transmission Control Protocol (TCP), or User Datagram Protocol (UDP).Finally it converts the traffic signature to DNA signature.The tests carried out show that the IDNASD could detect DNA signature for MSBlaster worm.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Monograph
  15. 15

    Design and implementation of a real-time adaptive learning algorithm controller for a 3-DOF parallel manipulator / Mustafa Jabbar Hayawi by Hayawi, Mustafa Jabbar

    Published 2015
    “…These effects, if not controlled, would lead to large scale oscillations that would damage system components. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Design of a swimming small soft robot for underwater applications by Chin, Chavez Zhee Ming

    Published 2024
    “…This directional control, along with linear swimming, was incorporated into a swimming algorithm controlled by three push buttons. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  17. 17
  18. 18

    Modelling of flexible beam based on ant colony optimization and cuckoo search algorithms by Ali, Siti Khadijah, Fadzilan, Mohamad Faisal, Shaari, Aida Nur Syafiqah, Hadi, Muhamad Sukri, Ting, Rickey Pek Eek, Mat Darus, Intan Zaurah

    Published 2021
    “…Therefore, two type of algorithms was used in this work for modelling development of flexible beam structure, which are ant colony optimization (ACO) and cuckoo search algorithm (CSA). …”
    Get full text
    Get full text
    Article
  19. 19

    Tuning of Distillation Column Control by Abu Hanipah, Muhammad Fathi

    Published 2015
    “…Once the designing of the controller is done, an algorithm is developed to make sure that the tuning of distillation column control can be done efficiently. …”
    Get full text
    Get full text
    Final Year Project
  20. 20

    Intelligent Tuning of PID Controller for Double-Link Flexible Robotic Arm Manipulator by Artificial Bee Colony Algorithm by Jamali, Annisa, Mat Darus, I.Z., Yatim, H.M, A. Talib, M. H., Hadi, M.S, Tokhi, M.O.

    Published 2020
    “…These problems may eventually cause damage to the highly stressed structure. This research focuses on the development of intelligent controller utilizing artificial bee colony (ABC) algorithm to tune proportional integral derivative (PID) parameters for controlling two-link flexible manipulator (TLFRM). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Book Chapter