Search Results - (( developing step control algorithm ) OR ( java implementation mining algorithm ))
Search alternatives:
- implementation mining »
- java implementation »
- mining algorithm »
- developing step »
- step control »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
2
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
Get full text
Get full text
Get full text
Article -
3
Scalable approach for mining association rules from structured XML data
Published 2009“…Many techniques have been proposed to tackle the problem of mining XML data we study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
Get full text
Get full text
Conference or Workshop Item -
4
Mining association rules from structured XML data
Published 2009“…Many techniques have been proposed to tackle the problem of mining XML data. We study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
Get full text
Get full text
Conference or Workshop Item -
5
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Image clustering comparison of two color segmentation techniques
Published 2010“…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
Get full text
Get full text
Thesis -
8
DC-link capacitor voltage control for single-phase shunt active power filter with step size error cancellation in self-charging algorithm
Published 2016“…This study presents an improved self-charging algorithm by introducing a new feature known as step size error cancellation for better performance of DC-link capacitor voltage control in single-phase shunt active power filter (SAPF). …”
Get full text
Get full text
Get full text
Article -
9
Photovoltaic shunt active power filter based on indirect self-charging with step size error cancellation and simplified adaptive linear neuron
Published 2017“…Therefore, this research work proposes design and development of single-phase PV SAPF with a new DC-link capacitor voltage control algorithm named as indirect self- charging with step size error cancellation, and a new harmonics extraction algorithm named as simplified ADALINE. …”
Get full text
Get full text
Thesis -
10
DC-link capacitor voltage control for single-phase shunt active power filter with step size error cancellation in self-charging algorithm
Published 2016“…This study presents an improved self-charging algorithm by introducing a new feature known as step size error cancellation for better performance of DC-link capacitor voltage control in single-phase shunt active power filter (SAPF). …”
Get full text
Get full text
Article -
11
Performance of Semi Active Lateral Control (SALC) algorithm for semi active suspension system in multibody co-simulation method / M. M. Abdul Majid ...[et al.]
Published 2018“…The publication presents a controller strategy used in development of Semi Active Lateral Control (SALC) algorithm for passenger vehicle in enhancing transient handling performance using multibody co-simulation approach. …”
Get full text
Get full text
Article -
12
Development of controller for an underactuated autonomous underwater vehicle (AUV)
Published 2019Get full text
Get full text
Research Report -
13
-
14
A comparative evaluation of PID-based optimisation controller algorithms for DC motor
Published 2023Article -
15
A Hybrid Adaptive Leadership GWO Optimization with Category Gradient Boosting on Decision Trees Algorithm for Credit Risk Control Classification
Published 2024“…The combined EBGWO-Catboost algorithm model is structured into four distinct steps. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
16
Three-dimensional coverage control for multi-unmanned aerial vehicle
Published 2024“…This study proposes a 3D coverage control algorithm to address complex real-world scenarios, wherein the 3D control algorithm will be developed based on the 2D MBC scheme. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
17
Simulink Implementation of Digital Cascade Control DC Motor Model - A didactic approach
Published 2008“…The development method is described step-by-step to give better understanding to electrical engineering students. …”
Get full text
Get full text
Article -
18
Black widow optimization-based optimal PI-controlled wind turbine emulator
Published 2023“…The performance of the BWOA optimized PI controller is compared with a BAT algorithm, particle swarm optimization, and genetic algorithm optimized PI controller to measure the effectiveness of the proposed control system. …”
Article -
19
Formulation of model predictive control algorithm for nonlinear processes
Published 2004“…It is the sole selection although many other sophisticated control algorithms have been developed largely because it is able to deliver satisfactory performance for most control problems when properly tuned and installed. …”
Get full text
Get full text
Monograph -
20
Development of a Web Access Control Technique Based User Access Behavior
Published 2004“…This thesis discusses about designs and develops techniques and algorithms for performing web access control. …”
Get full text
Get full text
Thesis
