Search Results - (( java application mining algorithm ) OR ( control identification based algorithm ))
Search alternatives:
- control identification »
- identification based »
- application mining »
- java application »
- mining algorithm »
-
1
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
2
-
3
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
Get full text
Get full text
Get full text
Article -
4
Hybrid DE-PEM algorithm for identification of UAV helicopter
Published 2014“…Practical implications – The identification algorithm is expected to facilitate the required model development for model-based control design for autonomous helicopter development. …”
Get full text
Get full text
Get full text
Article -
5
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
6
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
7
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
8
-
9
Fault Detection and Identification in Quadrotor System (Quadrotor Robot)
Published 2016“…The Quadrotor controller is designed such that it can be controlled using both the attitude control (inner loop) and position control (outer loop). …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
10
System identification of PFC rectifier controller using non-linear autoregressive moving average with exogenous inputs (NARMAX) model / Mohd Benyamin Sabtu
Published 2010“…The tests that been performed based on the PFC Rectifier Controller dataset, show that the OLS has the potential to become an effective method to determine the NARMAX model structure in the system identification model.…”
Get full text
Get full text
Thesis -
11
Identification and control of a small-scale helicopter
Published 2010“…This identification process is based on the well-known gradient descent learning algorithm. …”
Get full text
Article -
12
False path identification algorithm framework for nonseparable controller-data path circuits
Published 2016“…This paper proposes an algorithm frame-work to deal with these false paths through identification for DFT test. …”
Get full text
Get full text
Conference or Workshop Item -
13
False path identification algorithm framework for nonseparable controller-data path circuits
Published 2017“…This paper proposes an algorithm framework to deal with these false paths through identification for DFT test. …”
Get full text
Get full text
Article -
14
Grouping based radio frequency identification anti-collision protocols for dense internet of things application
Published 2022“…The results also demonstrate FCMBG bettered other grouping-based algorithms (GB-DFSA and GBSA) whose tag estimation method are based on collision slots in terms slot efficiency by over 10% and also in terms of identification time.…”
Get full text
Get full text
Article -
15
The efficiency of detecting the failures and troubleshooting while applying technical diagnostics for multi-computer systems
Published 2015“…This paper presents techniques which base on the concept of flows thinning together with the identification techniques. …”
Get full text
Get full text
Article -
16
Fast-varying flicker mitigation using D-statcom and its identification / Nur Fadhilah Jamaludin
Published 2015“…In this study, it is found that the proposed new control algorithm for D-STATCOM based on PLL controller together with HCC switching has been able to produce a better result as compared to the previous techniques in term of time response. …”
Get full text
Get full text
Thesis -
17
-
18
Improvement of Auto-Tracking Mobile Robot based on HSI Color Model
Published 2018“…In this project HSI-based color enhancement algorithm were used for object identification. …”
Get full text
Get full text
Get full text
Article -
19
Black hole algorithm along edge detector and circular hough transform based iris projection with biometric identification systems
Published 2024“…In this study, we presented a Black Hole Algorithm (BHA) along the Canny edge detector and circular Hough transform-based optimization technique for circular parameter identification of iris segmentation. …”
Get full text
Get full text
Article -
20
Autotuning PID Controllers for Quadplane Hybrid UAV using Differential Evolution Algorithm
Published 2024“…The unified RBF model is then used for autotuning the PID controller using the DE algorithm. The proposed RBF-NN system identification can successfully predict the attitude dynamics of a quadplane in all flight modes with a coefficient of determination of R2 greater than 0.9 and a computing mean time of less than 5 ms. …”
Get full text
Get full text
Get full text
Article
