Search Results - (( developing force connection algorithm ) OR ( java applications mining algorithm ))
Search alternatives:
- connection algorithm »
- applications mining »
- java applications »
- developing force »
- force connection »
- mining algorithm »
-
1
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
2
-
3
Node placement optimization using extended virtual force and cuckoo search algorithm in wireless sensor network
Published 2014“…The performance of Extended Virtual Force-Based Algorithm (EVFA) and Cuckoo Search (CS) algorithm are evaluated and EVFA shows the improvement of coverage area and exhibits a guaranteed connectivity compared to CS algorithm. …”
Get full text
Get full text
Get full text
Thesis -
4
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
Get full text
Get full text
Get full text
Article -
5
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
6
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
7
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
8
Development of airbag suit system for motorcyclist
Published 2014“…An airbag inside inflated automatically when a pin connecting the jacket to the bike was pulled from its socket forcefully. …”
Get full text
Get full text
Get full text
Article -
9
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
Get full text
Get full text
Thesis -
10
Implication of image processing algorithm in remote sensing and GIS applications
Published 2011“…This review presents evaluation and utilization of different algorithms such as Simple Recursive Algorithm, Backtracking Algorithm, Divide and Conquer Algorithm, Dynamic Algorithm, Branch and Bound Algorithm, Brute Force Algorithm and Randomized Algorithm. …”
Get full text
Get full text
Get full text
Article -
11
Development of optimized damage prediction method for health monitoring of ultra high performance fiber-reinforced concrete communication tower
Published 2018“…Damaging the full-scale tower is not practical; thus, two different parts of the tower segments and their connections (1-2 and 2-3) are considered and tested experimentally with and without damage to validate the capability of the developed hybrid algorithm to detect damage. …”
Get full text
Get full text
Thesis -
12
A study on data-driven impedance matching in four channels bilateral teleoperation
Published 2019“…The main objective of this research is to design and develop control algorithms to drive both sides of the master and slave system to attain symmetrical impedance between them. …”
Get full text
Get full text
Research Report -
13
Modular motor driver with torque control for gripping mechanism
Published 2023“…In implementing the project, several algorithms were tested to achieve the torque control algorithm requirement including on-off algorithm, P algorithm, PI algorithm, PD algorithm and PID algorithm. …”
Conference paper -
14
Computational methods for self-assembly of DNA nanostructures / Ong Hui San
Published 2016“…Several approaches have been adopted including development of an autonomous tool that incorporated evolutionary optimization algorithm in constructing these heterogeneous DNA shapes and the application of heuristic through undirected graph theory as an annotation schema to produce the connectivity maps. …”
Get full text
Get full text
Thesis -
15
Cryptanalysis and design of chaos based image encryption schemes
Published 2025“…This results in the development of the Logistic-Beta map, the 2D-Henonlog map, and the 2D-Sine-Henon Chaotic Map (2D-SHCM). …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
16
Digital closed loop controller of hydraulic cylinder using linear transducer / Mohd. Aizuddin Khalid
Published 2010“…SIMULINK is integrated with MATLAB, providing immediate access to an extensive range of tools that can develop algorithms, analyze and visualize simulations, customize the modeling environment, define signal, parameter, and test data. …”
Get full text
Get full text
Thesis -
17
Computer remote monitoring via mobile phones using socket programming / Samih Omer Fadlelmola Elkhider
Published 2011“…The studies show beyond technical algorithms, physical aspects plays a big rule in client server model. …”
Get full text
Get full text
Thesis -
18
Mode division multiplexing zero forcing equalisation scheme using LU factorization
Published 2016“…These technique mainly rely on Least Mean Squared (LMS) and Recursive Least Squared (RLS) algorithms. The purpose of this study is to introduce a Zero Forcing LU-based equalization scheme for MDM. …”
Get full text
Get full text
Get full text
Thesis -
19
-
20
Vibration-based structural damage detection and system identification using wavelet multiresolution analysis / Seyed Alireza Ravanfar
Published 2017“…Initially, the connection coefficients for the scaling function of the proper selection of Daubechies wavelets are developed to derive the velocity and displacement from the measured acceleration responses. …”
Get full text
Get full text
Get full text
Thesis
