Search Results - (( development programme control algorithm ) OR ( java data detection algorithm ))
Search alternatives:
- data detection »
- programme »
- java »
-
1
DC motor control using LQR algorithm
Published 2008“…Hence it is essential for complex algorithm to control real time process system. Programmable Logic Controller (PLC) is known as process models by industries for several years. …”
Get full text
Get full text
Undergraduates Project Papers -
2
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
Get full text
Get full text
Thesis -
3
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…A GUI is created in a form of JAVA application to display data detected from tag. …”
Get full text
Get full text
Thesis -
4
An ensemble learning method for spam email detection system based on metaheuristic algorithms
Published 2015“…In the second phase, a classifier ensemble learning model is proposed consisting of separate outputs: (i) To select a relevant subset of original features based on Binary Quantum Gravitational Search Algorithm (QBGSA), (ii) To mine data streams using various data chunks and overcome a failure of single classifiers based on SVM, MLP and K-NN algorithms. …”
Get full text
Get full text
Thesis -
5
Developed method of FPGA-based fuzzy logic controller design with the aid of conventional PID algorithm
Published 2009“…This paper proposes developed method to design a digital fuzzy logic controller with the aid of conventional Proportional – integral – derivative (PID) controller using field programmable gate array (FPGA). …”
Get full text
Get full text
Get full text
Article -
6
Image clustering comparison of two color segmentation techniques
Published 2010“…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
-
8
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis -
9
The development of embedded band-stop filter for vibration control of a flexible manipulator
Published 2009“…This project presents an investigation into development of feed forward control scheme for vibration control of a flexible manipulator using band-stop (IIR) filter technique using Xilinx (Spartan 3E) . …”
Get full text
Get full text
Undergraduates Project Papers -
10
Design high frequency surgical robot controller: design FPGA-based controller for surgical robot manipulator simscape modeling
Published 2016“…To design PID type FPGA-based controller two types algorithm are needed: derivative algorithm and integral algorithm. …”
Get full text
Get full text
Get full text
Article -
11
The development of embedded low-pass filter for vibration control of a flexible manipulator
Published 2009“…This project presents an investigation into developing feedforward control scheme for vibration of a flexible manipulator using low pass (IIR) filter technique using Xilinx ISE 10.1 (Spartan 3E). …”
Get full text
Get full text
Undergraduates Project Papers -
12
Investigation and validation of an eleven level symmetric modular multilevel inverter using grey wolf optimization and differential evolution control algorithm for solar PV applica...
Published 2021“…Purpose: This paper aims to examine the design and control of a symmetric multilevel inverter (MLI) using grey wolf optimization and differential evolution algorithms. …”
Get full text
Get full text
Article -
13
Development of LabVIEW FPGA program for Energy Management System (EMS) Controller for Hybrid Electric Vehicle (HEV)
Published 2016Get full text
Get full text
Final Year Project -
14
The implications for ahybrid detection technique against malicious sqlattacks on web applications
Published 2025“…The methodology is based on JavaScript and PHP languages for developing a new technique called DetectCombined capable of filtering queries using parameterized queries to protect against SQL injection which is a safe method. …”
Get full text
Get full text
Get full text
Article -
15
Controller placement problem in the optimization of 5G based SDN and NFV architecture
Published 2021“…The selected control number is picked with a higher efficiency before the rescheduling is approximately 80 % for optimized controllers up to 90 % of resource management than other comparable algorithms in such a densified network. …”
Get full text
Get full text
Thesis -
16
Develpoment of combinatorial optimisation for cutting tool path strategy
Published 2009“…The target was to develop models which mimic the actual cutting process using the Finite Element Method (FEM) and to validate the developed tool path strategy algorithm with the actual machining process and to programmer the developed algorithm into software. …”
Get full text
Get full text
Conference or Workshop Item -
17
Optimum Material Removal in Electrical Discharge Machining through Advanced Control Integration of PSoC Microcontroller
Published 2025“…The pulse generator algorithm was developed to effi ciently manage Ton and Toff , while the Proportional Integral Derivative (PID) algorithm was employed to uphold the gap between the electrode and the workpiece. …”
Get full text
Get full text
Get full text
Article -
18
Design and development of a programmable painting robot for houses and buildings
“…To Overcome This Difficulty, A Programmable Painter Robotic System Is Proposed, Designed And Developed. …”
Get full text
Get full text
Article -
19
Design and development of a programmable painting robot for houses and buildings
Published 2005“…To overcome this difficulty, a programmable painter robotic system is proposed, designed and developed. …”
Get full text
Get full text
Article -
20
Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography
Published 2009“…In addition, there are no formal methods to be followed to discover the hidden data. For this reason, the task of this paper becomes difficult. …”
Get full text
Get full text
Get full text
Article
